Sciweavers

152 search results - page 8 / 31
» Anonymous k -Show Credentials
Sort
View
ACSAC
2004
IEEE
15 years 1 months ago
Securing a Remote Terminal Application with a Mobile Trusted Device
Many real-world applications use credentials such as passwords as means of user authentication. When accessed from untrusted public terminals, such applications are vulnerable to ...
Alina Oprea, Dirk Balfanz, Glenn Durfee, Diana K. ...
FMICS
2010
Springer
14 years 10 months ago
A Formal Model of Identity Mixer
Identity Mixer is an anonymous credential system developed at IBM that allows users for instance to prove that they are over 18 years old without revealing their name or birthdate....
Jan Camenisch, Sebastian Mödersheim, Dieter S...
IEEEARES
2008
IEEE
15 years 4 months ago
A Critique of k-Anonymity and Some of Its Enhancements
k-Anonymity is a privacy property requiring that all combinations of key attributes in a database be repeated at least for k records. It has been shown that k-anonymity alone does...
Josep Domingo-Ferrer, Vicenç Torra
APPROX
2008
Springer
101views Algorithms» more  APPROX 2008»
14 years 11 months ago
Streaming Algorithms for k-Center Clustering with Outliers and with Anonymity
Clustering is a common problem in the analysis of large data sets. Streaming algorithms, which make a single pass over the data set using small working memory and produce a cluster...
Richard Matthew McCutchen, Samir Khuller
103
Voted
KDD
2008
ACM
202views Data Mining» more  KDD 2008»
15 years 10 months ago
Data and Structural k-Anonymity in Social Networks
The advent of social network sites in the last years seems to be a trend that will likely continue. What naive technology users may not realize is that the information they provide...
Alina Campan, Traian Marius Truta