Sciweavers

222 search results - page 45 / 45
» Secure Content Delivery using Key Composition
Sort
View
SIGMOD
2005
ACM
128views Database» more  SIGMOD 2005»
14 years 6 months ago
Deriving Private Information from Randomized Data
Randomization has emerged as a useful technique for data disguising in privacy-preserving data mining. Its privacy properties have been studied in a number of papers. Kargupta et ...
Zhengli Huang, Wenliang Du, Biao Chen
PAM
2010
Springer
14 years 29 days ago
Network DVR: A Programmable Framework for Application-Aware Trace Collection
Network traces are essential for a wide range of network applications, including traffic analysis, network measurement, performance monitoring, and security analysis. Existing cap...
Chia-Wei Chang, Alexandre Gerber, Bill Lin, Subhab...