Sciweavers

32 search results - page 1 / 7
» Does Privacy Require True Randomness
Sort
View
TCC
2007
Springer
94views Cryptology» more  TCC 2007»
13 years 11 months ago
Does Privacy Require True Randomness?
Carl Bosley, Yevgeniy Dodis
CEAS
2005
Springer
13 years 11 months ago
Searching For John Doe: Finding Spammers and Phishers
Microsoft has prosecuted a vigorous civil enforcement campaign against spammers and phishers. When initial investigation into a spam or phishing case fails to reveal the identity ...
Aaron E. Kornblum
PAKDD
2009
ACM
133views Data Mining» more  PAKDD 2009»
14 years 3 days ago
On Link Privacy in Randomizing Social Networks
Many applications of social networks require relationship anonymity due to the sensitive, stigmatizing, or confidential nature of relationship. Recent work showed that the simple ...
Xiaowei Ying, Xintao Wu
PAKDD
2009
ACM
134views Data Mining» more  PAKDD 2009»
14 years 2 months ago
On Link Privacy in Randomizing Social Networks.
Many applications of social networks require relationship anonymity due to the sensitive, stigmatizing, or confidential nature of relationship. Recent work showed that the simple ...
Xiaowei Ying, Xintao Wu
ICDE
2007
IEEE
165views Database» more  ICDE 2007»
14 years 6 months ago
On Randomization, Public Information and the Curse of Dimensionality
A key method for privacy preserving data mining is that of randomization. Unlike k-anonymity, this technique does not include public information in the underlying assumptions. In ...
Charu C. Aggarwal