Sciweavers

152 search results - page 9 / 31
» Anonymous k -Show Credentials
Sort
View
ESORICS
2008
Springer
14 years 11 months ago
A Multi-Path Approach for k-Anonymity in Mobile Hybrid Networks
The ubiquitous proliferation of mobile devices has given rise to novel user-centric application and services. In current mobile systems, users gain access to remote service provide...
Claudio Agostino Ardagna, Angelos Stavrou, Sushil ...
ICDE
2007
IEEE
145views Database» more  ICDE 2007»
15 years 11 months ago
On Multidimensional k-Anonymity with Local Recoding Generalization
This paper presents the first theoretical study, on using local-recoding generalization (LRG) to compute a kanonymous table with quality guarantee. First, we prove that it is NP-h...
Yang Du, Tian Xia, Yufei Tao, Donghui Zhang, Feng ...
ICDE
2005
IEEE
170views Database» more  ICDE 2005»
15 years 11 months ago
Data Privacy through Optimal k-Anonymization
Roberto J. Bayardo Jr., Rakesh Agrawal
ICDE
2007
IEEE
103views Database» more  ICDE 2007»
15 years 4 months ago
A k-Anonymity Model for Spatio-Temporal Data
Polixeni Zacharouli, Aris Gkoulalas-Divanis, Vassi...
74
Voted
CISC
2007
Springer
120views Cryptology» more  CISC 2007»
15 years 3 months ago
Anonymity and k-Choice Identities
Jacek Cichon, Miroslaw Kutylowski