Sciweavers

1906 search results - page 170 / 382
» Data Privacy
Sort
View
134
Voted
WISTP
2010
Springer
15 years 1 months ago
Efficient Mutual Authentication for Multi-domain RFID Systems Using Distributed Signatures
Abstract. The use of RFID technology in complex and distributed environments often leads to a multi-domain RFID system in which security issues such as authentication of tags and r...
Michael Braun, Ulrike Meyer, Susanne Wetzel
245
Voted
MKTSCI
2011
354views Multimedia» more  MKTSCI 2011»
14 years 6 months ago
Online Display Advertising: Targeting and Obtrusiveness
We use data from a large-scale field experiment to explore what influences the effectiveness of online advertising. We find that matching an ad to website content and increasing a...
Avi Goldfarb, Catherine Tucker
ICDM
2009
IEEE
162views Data Mining» more  ICDM 2009»
15 years 10 months ago
Accurate Estimation of the Degree Distribution of Private Networks
—We describe an efficient algorithm for releasing a provably private estimate of the degree distribution of a network. The algorithm satisfies a rigorous property of differenti...
Michael Hay, Chao Li, Gerome Miklau, David Jensen
134
Voted
ACSAC
2010
IEEE
15 years 1 months ago
A multi-user steganographic file system on untrusted shared storage
Existing steganographic file systems enable a user to hide the existence of his secret data by claiming that they are (static) dummy data created during disk initialization. Such ...
Jin Han, Meng Pan, Debin Gao, HweeHwa Pang
ICDE
2006
IEEE
149views Database» more  ICDE 2006»
15 years 9 months ago
An Encrypted, Content Searchable Scalable Distributed Data Structure
Scalable Distributed Data Structures (SDDS) store data in a file of key-based records distributed over many storage sites. The number of storage sites utilized grows and shrinks w...
Thomas J. E. Schwarz, Peter Tsui, Witold Litwin