Sciweavers

2386 search results - page 229 / 478
» Database Security 2000
Sort
View
SIGMOD
2005
ACM
97views Database» more  SIGMOD 2005»
15 years 11 months ago
Incognito: Efficient Full-Domain K-Anonymity
A number of organizations publish microdata for purposes such as public health and demographic research. Although attributes that clearly identify individuals, such as Name and So...
Kristen LeFevre, David J. DeWitt, Raghu Ramakrishn...
75
Voted
NDSS
2009
IEEE
15 years 5 months ago
The Blind Stone Tablet: Outsourcing Durability to Untrusted Parties
We introduce a new paradigm for outsourcing the durability property of a multi-client transactional database to an untrusted service provider. Specifically, we enable untrusted s...
Peter Williams, Radu Sion, Dennis Shasha
112
Voted
SICHERHEIT
2008
15 years 10 days ago
Monkey-Spider: Detecting Malicious Websites with Low-Interaction Honeyclients
Abstract: Client-side attacks are on the rise: malicious websites that exploit vulnerabilities in the visitor's browser are posing a serious threat to client security, comprom...
Ali Ikinci, Thorsten Holz, Felix C. Freiling
ICMCS
2000
IEEE
206views Multimedia» more  ICMCS 2000»
15 years 3 months ago
Audio Watermarking: Features, Applications, and Algorithms
This paper considers desired properties and possible applications of audio watermarking algorithms. Special attention is given to statistical methods working in the fourier domain...
Michael Arnold
CRYPTO
2000
Springer
128views Cryptology» more  CRYPTO 2000»
15 years 3 months ago
The XTR Public Key System
This paper introduces the XTR public key system. XTR is based on a new method to represent elements of a subgroup of a multiplicative group of a finite field. Application of XTR ...
Arjen K. Lenstra, Eric R. Verheul