Sciweavers

1906 search results - page 244 / 382
» Data Privacy
Sort
View
CCR
1999
138views more  CCR 1999»
15 years 3 months ago
Context-agile encryption for high speed communication networks
Different applications have different security requirements for data privacy, data integrity, and authentication. Encryption is one technique that addresses these requirements. En...
Lyndon G. Pierson, Edward L. Witzke, Mark O. Bean,...
124
Voted
CAISE
2003
Springer
15 years 9 months ago
SIM-Filter: User Profile based Smart Information Filtering and Personalization in Smartcard
The emergence of new information and communication system technologies allow the appearance of new techniques of data processing. Thus, it is increasingly difficult to user to find...
Abdelkrim Lahlou, Pascal Urien
PODS
2004
ACM
109views Database» more  PODS 2004»
16 years 4 months ago
On the Complexity of Optimal K-Anonymity
The technique of k-anonymization has been proposed in the literature as an alternative way to release public information, while ensuring both data privacy and data integrity. We p...
Adam Meyerson, Ryan Williams
IMC
2007
ACM
15 years 5 months ago
Legal issues surrounding monitoring during network research
This work was motivated by a discussion that two of the coauthors (computer science professors) had with the other coauthor (a law professor and a former computer crime Trial Atto...
Douglas C. Sicker, Paul Ohm, Dirk Grunwald
CHI
2003
ACM
16 years 4 months ago
Intuitive visualizations for presence and recency information for ambient displays
The Semi-Public Displays project utilizes public displays to assist in the interactions of small groups. This paper describes a set of visualizations for presence information of g...
Jaroslav Tyman, Elaine M. Huang