Collaborative filtering with privacy via factor analysis
SIGIR '02 Proceedings of the 25th annual international ACM SIGIR conference on Research and development in information retrieval
Location Privacy in Pervasive Computing
IEEE Pervasive Computing
CRYPTO '88 Proceedings of the 8th Annual International Cryptology Conference on Advances in Cryptology
A Practical Secret Voting Scheme for Large Scale Elections
ASIACRYPT '92 Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques: Advances in Cryptology
Collaborative Filtering with Privacy
SP '02 Proceedings of the 2002 IEEE Symposium on Security and Privacy
Reputation-based Wi-Fi deployment protocols and security analysis
Proceedings of the 2nd ACM international workshop on Wireless mobile applications and services on WLAN hotspots
IEEE Transactions on Knowledge and Data Engineering
Improved access point selection
Proceedings of the 4th international conference on Mobile systems, applications and services
The need for cross-layer information in access point selection algorithms
Proceedings of the 6th ACM SIGCOMM conference on Internet measurement
Blind calibration of sensor networks
Proceedings of the 6th international conference on Information processing in sensor networks
Facilitating access point selection in IEEE 802.11 wireless networks
IMC '05 Proceedings of the 5th ACM SIGCOMM conference on Internet Measurement
Using emulation to understand and improve wireless networks and applications
NSDI'05 Proceedings of the 2nd conference on Symposium on Networked Systems Design & Implementation - Volume 2
Tor: the second-generation onion router
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
IEEE Pervasive Computing
Experience with an object reputation system for peer-to-peer filesharing
NSDI'06 Proceedings of the 3rd conference on Networked Systems Design & Implementation - Volume 3
IPSN '08 Proceedings of the 7th international conference on Information processing in sensor networks
Improving wireless privacy with an identifier-free link layer protocol
Proceedings of the 6th international conference on Mobile systems, applications, and services
Anonysense: privacy-aware people-centric sensing
Proceedings of the 6th international conference on Mobile systems, applications, and services
SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks
SP '08 Proceedings of the 2008 IEEE Symposium on Security and Privacy
Mark-and-sweep: getting the "inside" scoop on neighborhood networks
Proceedings of the 8th ACM SIGCOMM conference on Internet measurement
DSybil: Optimal Sybil-Resistance for Recommendation Systems
SP '09 Proceedings of the 2009 30th IEEE Symposium on Security and Privacy
On the anonymity of periodic location samples
SPC'05 Proceedings of the Second international conference on Security in Pervasive Computing
Place lab: device positioning using radio beacons in the wild
PERVASIVE'05 Proceedings of the Third international conference on Pervasive Computing
Bandwidth estimation: metrics, measurement techniques, and tools
IEEE Network: The Magazine of Global Internetworking
Energy-delay tradeoffs in smartphone applications
Proceedings of the 8th international conference on Mobile systems, applications, and services
Proceedings of the fifth ACM international workshop on Mobility in the evolving internet architecture
CasCap: cloud-assisted context-aware power management for mobile devices
MCS '11 Proceedings of the second international workshop on Mobile cloud computing and services
AccuLoc: practical localization of performance measurements in 3G networks
MobiSys '11 Proceedings of the 9th international conference on Mobile systems, applications, and services
NetQuery: a knowledge plane for reasoning about network properties
Proceedings of the ACM SIGCOMM 2011 conference
Enhancing mobile data offloading with mobility prediction and prefetching
Proceedings of the seventh ACM international workshop on Mobility in the evolving internet architecture
PROTEUS: network performance forecast for real-time, interactive mobile applications
Proceeding of the 11th annual international conference on Mobile systems, applications, and services
Enhancing mobile data offloading with mobility prediction and prefetching
ACM SIGMOBILE Mobile Computing and Communications Review
Hi-index | 0.00 |
Wi-Fi clients can obtain much better performance at some commercial hotspots than at others. Unfortunately, there is currently no way for users to determine which hotspot access points (APs) will be sufficient to run their applications before purchasing access. To address this problem, this paper presents Wifi-Reports, a collaborative service that provides Wi-Fi clients with historical information about AP performance and application support. The key research challenge in Wifi-Reports is to obtain accurate user-submitted reports. This is challenging because two conflicting goals must be addressed in a practical system: preserving the privacy of users' reports and limiting fraudulent reports. We introduce a practical cryptographic protocol that achieves both goals, and we address the important engineering challenges in building Wifi-Reports. Using a measurement study of commercial APs in Seattle, we show that Wifi-Reports would improve performance over previous AP selection approaches in 30%-60% of locations.