Sciweavers

480 search results - page 3 / 96
» Anonymous Transactions in Computer Networks
Sort
View
73
Voted
TKDE
2011
472views more  TKDE 2011»
14 years 5 months ago
Anonymous Publication of Sensitive Transactional Data
Abstract—Existing research on privacy-preserving data publishing focuses on relational data: in this context, the objective is to enforce privacy-preserving paradigms, such as k-...
Gabriel Ghinita, Panos Kalnis, Yufei Tao
71
Voted
AINA
2003
IEEE
15 years 3 months ago
Validation-Based Reprocessing Scheme for Updating Spatial Data in Mobile Computing Environments
This paper introduces a novel reprocessingtransaction model that handles the update conflicts between mobile transactions without abortion. The proposed model executes a new subtr...
Donghyun Kim, Bonghee Hong, Byunggu Yu, Eun Suk Ho...
122
Voted
WPES
2006
ACM
15 years 4 months ago
Measuring relationship anonymity in mix networks
Many applications of mix networks such as anonymous Web browsing require relationship anonymity: it should be hard for the attacker to determine who is communicating with whom. Co...
Vitaly Shmatikov, Ming-Hsiu Wang
74
Voted
NDSS
2008
IEEE
15 years 4 months ago
Taming the Devil: Techniques for Evaluating Anonymized Network Data
Anonymization plays a key role in enabling the public release of network datasets, and yet there are few, if any, techniques for evaluating the efficacy of network data anonymiza...
Scott E. Coull, Charles V. Wright, Angelos D. Kero...
94
Voted
CSE
2009
IEEE
14 years 8 months ago
Edge Anonymity in Social Network Graphs
Edges in social network graphs can model sensitive relationships. In this paper, we consider the problem of edges anonymity in graphs. We propose a probabilistic notion of edge ano...
Lijie Zhang, Weining Zhang