Sciweavers

32 search results - page 7 / 7
» Efficient attributes for anonymous credentials
Sort
View
AUSDM
2008
Springer
188views Data Mining» more  AUSDM 2008»
13 years 6 months ago
Priority Driven K-Anonymisation for Privacy Protection
Given the threat of re-identification in our growing digital society, guaranteeing privacy while providing worthwhile data for knowledge discovery has become a difficult problem. ...
Xiaoxun Sun, Hua Wang, Jiuyong Li
COLCOM
2007
IEEE
13 years 8 months ago
Transparent security for collaborative environments
Current collaborative tools are often not able to profit from existing systems for user management. It is therefore necessary for collaborative systems to administrate their users ...
Eva Hladká, Daniel Kouril, Michal Proch&aac...