Sciweavers

1906 search results - page 166 / 382
» Data Privacy
Sort
View
131
Voted
ICDM
2009
IEEE
130views Data Mining» more  ICDM 2009»
15 years 1 months ago
Efficient Anonymizations with Enhanced Utility
The k-anonymization method is a commonly used privacy-preserving technique. Previous studies used various measures of utility that aim at enhancing the correlation between the orig...
Jacob Goldberger, Tamir Tassa
172
Voted
ICC
2009
IEEE
171views Communications» more  ICC 2009»
15 years 1 months ago
IPsec-Based Anonymous Networking: A Working Implementation
Protecting users' privacy is becoming one of the rising issues for the success of future communications. The Internet in particular, with its open architecture, presents sever...
Csaba Király, Renato Lo Cigno
CSFW
2003
IEEE
15 years 8 months ago
Type-Based Distributed Access Control
A type system is presented that combines a weak form of information flow control, termed distributed access control in the paper, with typed cryptographic operations. The motivat...
Tom Chothia, Dominic Duggan, Jan Vitek
137
Voted
WINET
2010
199views more  WINET 2010»
15 years 1 months ago
Secure encrypted-data aggregation for wireless sensor networks
This paper proposes a secure encrypted-data aggregation scheme for wireless sensor networks. Our design for data aggregation eliminates redundant sensor readings without using encr...
Shih-I Huang, Shiuhpyng Shieh, J. D. Tygar
ICDM
2006
IEEE
93views Data Mining» more  ICDM 2006»
15 years 9 months ago
Comparisons of K-Anonymization and Randomization Schemes under Linking Attacks
Recently K-anonymity has gained popularity as a privacy quantification against linking attacks, in which attackers try to identify a record with values of some identifying attrib...
Zhouxuan Teng, Wenliang Du