Sciweavers

480 search results - page 3 / 96
» Anonymous Transactions in Computer Networks
Sort
View
TKDE
2011
472views more  TKDE 2011»
13 years 21 days ago
Anonymous Publication of Sensitive Transactional Data
Abstract—Existing research on privacy-preserving data publishing focuses on relational data: in this context, the objective is to enforce privacy-preserving paradigms, such as k-...
Gabriel Ghinita, Panos Kalnis, Yufei Tao
AINA
2003
IEEE
13 years 11 months ago
Validation-Based Reprocessing Scheme for Updating Spatial Data in Mobile Computing Environments
This paper introduces a novel reprocessingtransaction model that handles the update conflicts between mobile transactions without abortion. The proposed model executes a new subtr...
Donghyun Kim, Bonghee Hong, Byunggu Yu, Eun Suk Ho...
WPES
2006
ACM
13 years 11 months ago
Measuring relationship anonymity in mix networks
Many applications of mix networks such as anonymous Web browsing require relationship anonymity: it should be hard for the attacker to determine who is communicating with whom. Co...
Vitaly Shmatikov, Ming-Hsiu Wang
NDSS
2008
IEEE
14 years 4 days ago
Taming the Devil: Techniques for Evaluating Anonymized Network Data
Anonymization plays a key role in enabling the public release of network datasets, and yet there are few, if any, techniques for evaluating the efficacy of network data anonymiza...
Scott E. Coull, Charles V. Wright, Angelos D. Kero...
CSE
2009
IEEE
13 years 3 months ago
Edge Anonymity in Social Network Graphs
Edges in social network graphs can model sensitive relationships. In this paper, we consider the problem of edges anonymity in graphs. We propose a probabilistic notion of edge ano...
Lijie Zhang, Weining Zhang