Sciweavers

518 search results - page 44 / 104
» Abstract Interpretation-Based Protection
Sort
View
105
Voted
PAKDD
2004
ACM
121views Data Mining» more  PAKDD 2004»
15 years 7 months ago
Secure Association Rule Sharing
Abstract. The sharing of association rules is often beneficial in industry, but requires privacy safeguards. One may decide to disclose only part of the knowledge and conceal stra...
Stanley R. M. Oliveira, Osmar R. Zaïane, Y&uu...
149
Voted
WWIC
2004
Springer
197views Communications» more  WWIC 2004»
15 years 7 months ago
Context-Aware Group Communication in Mobile Ad-Hoc Networks
Abstract. The widespread availability of both fixed and wireless network connectivity and the growing market of portable devices are enabling anytime and anywhere impromptu collabo...
Dario Bottazzi, Antonio Corradi, Rebecca Montanari
114
Voted
WASA
2009
Springer
186views Algorithms» more  WASA 2009»
15 years 7 months ago
Utopia Providing Trusted Social Network Relationships within an Un-trusted Environment
Abstract. This paper introduces an unobtrusive method and distributed solution set to aid users of on-line social networking sites, by creating a trusted environment in which every...
William Gauvin, Benyuan Liu, Xinwen Fu, Jie Wang
FC
1999
Springer
184views Cryptology» more  FC 1999»
15 years 6 months ago
Flow Control: A New Approach for Anonymity Control in Electronic Cash Systems
Abstract. Anonymity features of electronic payment systems are important for protecting privacy in an electronic world. However, complete anonymity prevents monitoring financial t...
Tomas Sander, Amnon Ta-Shma
124
Voted
EUROPKI
2007
Springer
15 years 6 months ago
OpenHSM: An Open Key Life Cycle Protocol for Public Key Infrastructure's Hardware Security Modules
Abstract. The private keys used in a PKI are its most important asset. Protect these keys from unauthorised use or disclosure is essential to secure a PKI. Relying parties need ass...
Jean Everson Martina, Túlio Cicero Salvaro ...