Sciweavers

1906 search results - page 10 / 382
» Data Privacy
Sort
View
112
Voted
SP
2005
IEEE
15 years 10 months ago
Towards Constant Bandwidth Overhead Integrity Checking of Untrusted Data
Dwaine E. Clarke, G. Edward Suh, Blaise Gassend, A...
93
Voted
CCS
2010
ACM
15 years 5 months ago
An opportunistic authority evaluation scheme for data security in crisis management scenarios
Enrico Scalavino, Giovanni Russello, Rudi Ball, Va...
115
Voted
CCS
2010
ACM
15 years 5 months ago
Losing control of the internet: using the data plane to attack the control plane
Max Schuchard, Abedelaziz Mohaisen, Denis Foo Kune...
TRUSTBUS
2004
Springer
15 years 10 months ago
Privacy Preserving Data Generation for Database Application Performance Testing
Abstract. Synthetic data plays an important role in software testing. In this paper, we initiate the study of synthetic data generation models for the purpose of application softwa...
Yongge Wang, Xintao Wu, Yuliang Zheng
132
Voted
GI
2009
Springer
15 years 2 months ago
Putting Privacy Pictograms into Practice - a European Perspective
: Recent proposals for privacy pictograms show a growing interest of simplifying privacy-related statements. Such pictograms can be useful to enhance the users' understanding ...
Marit Hansen