Filters








137 Hits in 6.6 sec

A practical privacy-preserving targeted advertising scheme for IPTV users

Leyli Javid Khayati, Cengiz Orencik, Erkay Savas, Berkant Ustaoglu
2015 International Journal of Information Security  
In this work, we present a privacy-preserving scheme for targeted advertising via the Internet Protocol TV (IPTV).  ...  The scheme uses a communication model involving a collection of subscribers, a content provider (IPTV), advertisers and a semi-trusted server.  ...  The core challenge we address in this paper is facilitation of such operations, in the context of a practical privacy-preserving targeted advertisement scheme.  ... 
doi:10.1007/s10207-015-0296-7 fatcat:hhkjlvf7vzhhplclak4vpj2xyu

Socio‐technical analysis of IPTV: a case study of Korean IPTV

Dong H. Shin
2007 Info  
Practical implications -The case of Korea offers implications for other countries that are pursuing IPTV development strategies.  ...  Purpose -This paper seeks to investigate the prospects for internet protocol TV (IPTV) from the social, economic and regulatory perspective to gain a better understanding of how IPTV will evolve and stabilize  ...  prices for users.  ... 
doi:10.1108/14636690710725076 fatcat:3qut65gmtvfnvcj63lzig3uc54

Modeling user activities in a large IPTV system

Tongqing Qiu, Zihui Ge, Seungjoon Lee, Jia Wang, Jun Xu, Qi Zhao
2009 Proceedings of the 9th ACM SIGCOMM conference on Internet measurement conference - IMC '09  
a set of real users watching IPTV.  ...  Internet Protocol Television (IPTV) has emerged as a new delivery method for TV.  ...  P2P type content caching scheme for IPTV) may require a proper modeling of such channel popularity dynamics.  ... 
doi:10.1145/1644893.1644945 dblp:conf/imc/QiuGLWXZ09 fatcat:h5dlfxjcjja7xgx2mdv5zkfzvi

Privacy in Social Media: Identification, Mitigation and Applications [article]

Ghazaleh Beigi, Huan Liu
2018 arXiv   pre-print
We also discuss open problems and future research directions for user privacy issues in social media.  ...  Consequently, various protection techniques have been proposed to anonymize user-generated social media data. There is a vast literature on privacy of users in social media from many perspectives.  ...  ACKNOWLEDGMENTS The authors would like to thank Alexander Nou for his help throughout the paper.  ... 
arXiv:1808.02191v1 fatcat:grcar6kx7nbqlf7o3ygrn4te44

A Fog Based Middleware for Automated Compliance With OECD Privacy Principles in Internet of Healthcare Things

Ahmed M. Elmisery, Seungmin Rho, Dmitri Botvich
2016 IEEE Access  
Additionally, the proposed solution complies with one of the common privacy regulation frameworks for fair information practice in a natural and functional way-which is OECD privacy principles.  ...  We depicted how the proposed approach can be integrated into a scenario related to preserving the privacy of the users' health data that is utilized by a cloud-based healthcare recommender service in order  ...  This holistic middleware can be utilized for cloud based healthcare services to facilitate access to a wealth of users' health data in a privacy-preserving manner.  ... 
doi:10.1109/access.2016.2631546 fatcat:xordqsl2t5hfrbxqhipzjcets4

Survey on Multi-Access Edge Computing Security and Privacy

Pasika Ranaweera, Anca Delia Jurcut, Madhusanka Liyanage
2021 IEEE Communications Surveys and Tutorials  
for preserving user privacy from identity protection IoT data aggregation [164] Three layer privacy preserving model for IoT enabled MEC deployments that employ a crypto system with homomorphic properties  ...  [158] proposed a chaff service based approach to preserve the user privacy. In their work, the chaff service is launched by the user or the MEC platform for confusing the eavesdropper.  ... 
doi:10.1109/comst.2021.3062546 fatcat:u3xxvixiw5a4fdl2wxdla24ocu

The disparity between P2P overlays and ISP underlays: issues, existing solutions, and challenges

Jie Dai, Fangming Liu, Bo Li
2010 IEEE Network  
Recently, increasing efforts have been directed toward mitigating ISP costs from P2P applications while preserving the user perceived service quality.  ...  owadays, the Internet has witnessed a remarkable increase in the popularity of peer-to-peer (P2P) applications over ever increasing user bases, which has placed a tremendous traffic burden on the Internet  ...  Acknowledgment The research was support in part by a grant from RGC under contract 615608 and by a grant from NSFC/RGC under contract N_HKUST603/07.  ... 
doi:10.1109/mnet.2010.5634441 fatcat:gbxs7h2yfbgf5hhlyiohgpq7vq

Towards automated performance diagnosis in a large IPTV network

Ajay Anil Mahimkar, Zihui Ge, Aman Shaikh, Jia Wang, Jennifer Yates, Yin Zhang, Qi Zhao
2009 Proceedings of the ACM SIGCOMM 2009 conference on Data communication - SIGCOMM '09  
We collect a large amount of measurement data from a wide range of sources, including device usage and error logs, user activity logs, video quality alarms, and customer trouble tickets.  ...  IPTV is increasingly being deployed and offered as a commercial service to residential broadband customers.  ...  We are also grateful to the network operations and customer support teams of the anonymous IPTV service provider for their kind help on the data collection and the case study analysis.  ... 
doi:10.1145/1592568.1592596 dblp:conf/sigcomm/MahimkarGSWYZZ09 fatcat:fq6jihnolzf7nfmgps5qatuwbq

Towards automated performance diagnosis in a large IPTV network

Ajay Anil Mahimkar, Zihui Ge, Aman Shaikh, Jia Wang, Jennifer Yates, Yin Zhang, Qi Zhao
2009 Computer communication review  
We collect a large amount of measurement data from a wide range of sources, including device usage and error logs, user activity logs, video quality alarms, and customer trouble tickets.  ...  IPTV is increasingly being deployed and offered as a commercial service to residential broadband customers.  ...  We are also grateful to the network operations and customer support teams of the anonymous IPTV service provider for their kind help on the data collection and the case study analysis.  ... 
doi:10.1145/1594977.1592596 fatcat:r2g2ppcnuvbgvdhtxtv6wj4r6i

The Impact of Next Generation Television on Consumers and the First Amendment

Rob Frieden
2013 Social Science Research Network  
between stakeholders and to remedy anticompetitive practices.  ...  storage and the Internet's ability to serve as a single medium for a variety of previously standalone services delivered via different channels.  ...  The term IPTV refers to the ability of the Internet, and specifically its Internet Protocol addressing scheme and its Transmission Control Protocol bitstream management formats, to provide broadband users  ... 
doi:10.2139/ssrn.2261327 fatcat:ufgqcf7srbfz3ivl2vne47hclu

Vlogging

Wen Gao, Yonghong Tian, Tiejun Huang, Qiang Yang
2010 ACM Computing Surveys  
We also make an in-depth investigation of various vlog mining topics from a research perspective and present several incentive applications such as user-targeted video advertising and collective intelligence  ...  This article presents a comprehensive survey of videoblogging (vlogging for short) as a new technological trend.  ...  We also wish to thank our colleagues in JDL lab for providing the related materials.  ... 
doi:10.1145/1749603.1749606 fatcat:qeopjzg4j5bwparwtbmvwdesd4

Net neutrality - How relevant is it to Australia?

James Endres
2009 Telecommunications Journal of Australia  
I would like to thank Derek Slater, Carolyn Dalton, and Rick Whitt at Google for their assistance.  ...  for false advertising, and $1500 per subscriber for alleged privacy violations.  ...  A key point from this table is that AT&T is reserving at least 19 Mbps for its U-verse IPTV services and Verizon is reserving at least 80 Mbps for its FiOS TV IPTV service today.  ... 
doi:10.2104/tja09022 fatcat:iyhfeahrmverdoaskclswtokx4

Privacy-preserving Targeted Advertising Scheme for IPTV using the Cloud
english

2012 Proceedings of the International Conference on Security and Cryptography   unpublished
In this paper, we present a privacy-preserving scheme for targeted advertising via the Internet Protocol TV (IPTV).  ...  The performance of the proposed scheme is evaluated with experiments, which show that the scheme is suitable for practical usage.  ...  CONCLUSION AND FUTURE WORK We propose a practical solution for secure and privacy-preserving targeted advertising service for IPTV subscribers utilizing cloud computing.  ... 
doi:10.5220/0004021900740083 fatcat:6qlthd3cfvfqdmq7w246x4aaia

Media Ecosystems: A Novel Approach for Content-Awareness in Future Networks [chapter]

H. Koumaras, D. Negru, E. Borcoci, V. Koumaras, C. Troulos, Y. Lapid, E. Pallis, M. Sidibé, A. Pinto, G. Gardikis, G. Xilouris, C. Timmerer
2011 Lecture Notes in Computer Science  
for his best service experience possible, taking the role of a consumer and/or producer.  ...  The proposed solution is based on a flexible cooperation between providers, operators, and end-users, finally enabling every user first to access the offered multimedia services in various contexts, and  ...  ., IPTV) in different modes (e.g. P2P). Content is offered to the CCs or SPs through quality guarantee schemes such as Service Level Agreements (SLAs).  ... 
doi:10.1007/978-3-642-20898-0_26 fatcat:s2rtwyldojeohpeuin2drca25i

2020 Index IEEE Transactions on Vehicular Technology Vol. 69

2020 IEEE Transactions on Vehicular Technology  
-16223 Hoon-Kim, T., see Kumar, G., TVT July 2020 7707-7722 Horlin, F., see Monfared, S., TVT Oct. 2020 11369-11382 Horng, S., Lu, C., and Zhou, W., An Identity-Based and Revocable Data-Sharing Scheme  ...  + Check author entry for coauthors ami-mFading Channels With Integer and Non-Integerm; TVT March 2020 2785-2801 Hoang, T.M., Tran, X.N., Nguyen, B.C., and Dung, L.T., On the Performance of MIMO Full-Duplex  ...  ., +, TVT April 2020 4558-4562 Advertising Transparent and Accountable Vehicular Local Advertising With Practical Blockchain Designs.  ... 
doi:10.1109/tvt.2021.3055470 fatcat:536l4pgnufhixneoa3a3dibdma
« Previous Showing results 1 — 15 out of 137 results