Sciweavers

901 search results - page 1 / 181
» On Anonymization of String Data
Sort
View
SDM
2007
SIAM
195views Data Mining» more  SDM 2007»
13 years 6 months ago
On Anonymization of String Data
String data is especially important in the privacy preserving data mining domain because most DNA and biological data is coded as strings. In this paper, we will discuss a new met...
Charu C. Aggarwal, Philip S. Yu
ICICS
2009
Springer
13 years 11 months ago
Biometric-Based Non-transferable Anonymous Credentials
This work explores the problem of using biometric data to achieve non-transferability of anonymous credentials; that is, sharing of anonymous credentials, which allow one to anonym...
Marina Blanton, William M. P. Hudelson
ICDE
2011
IEEE
253views Database» more  ICDE 2011»
12 years 8 months ago
Preventing equivalence attacks in updated, anonymized data
—In comparison to the extensive body of existing work considering publish-once, static anonymization, dynamic anonymization is less well studied. Previous work, most notably
Yeye He, Siddharth Barman, Jeffrey F. Naughton

Book
3022views
15 years 28 days ago
Algorithms for Programmers
"This is the (work in progress) book "Algorithms for Programmers". Publication as soon as possible, content is (modulo copy editing) close to final version. I will p...
Jörg Arndt
AINA
2011
IEEE
12 years 8 months ago
Data Caching for Enhancing Anonymity
—The benefits of caching for reducing access time to frequently needed data, in order to improve system performance, are already well-known. In this paper, a proposal for employ...
Rajiv Bagai, Bin Tang