Sciweavers

108 search results - page 17 / 22
» Differential privacy in data publication and analysis
Sort
View
ESORICS
2012
Springer
13 years 2 months ago
X.509 Forensics: Detecting and Localising the SSL/TLS Men-in-the-Middle
Although recent compromises and admissions have given new credibility to claimed encounters of Man-in-the-middle (MitM) attacks on SSL/TLS, very little proof exists in the public r...
Ralph Holz, Thomas Riedmaier, Nils Kammenhuber, Ge...
ESORICS
2009
Springer
16 years 8 days ago
ReFormat: Automatic Reverse Engineering of Encrypted Messages
Automatic protocol reverse engineering has recently received significant attention due to its importance to many security applications. However, previous methods are all limited in...
Zhi Wang, Xuxian Jiang, Weidong Cui, Xinyuan Wang,...
132
Voted
SP
1997
IEEE
163views Security Privacy» more  SP 1997»
15 years 3 months ago
Anonymous Connections and Onion Routing
Onion Routing is an infrastructure for private communication over a public network. It provides anonymous connections that are strongly resistant to both eavesdropping and tra c a...
Paul F. Syverson, David M. Goldschlag, Michael G. ...
113
Voted
BMCBI
2005
152views more  BMCBI 2005»
14 years 11 months ago
CoPub Mapper: mining MEDLINE based on search term co-publication
Background: High throughput microarray analyses result in many differentially expressed genes that are potentially responsible for the biological process of interest. In order to ...
Blaise T. F. Alako, Antoine Veldhoven, Sjozef van ...
82
Voted
BMCBI
2007
105views more  BMCBI 2007»
14 years 11 months ago
Text-derived concept profiles support assessment of DNA microarray data for acute myeloid leukemia and for androgen receptor sti
Background: High-throughput experiments, such as with DNA microarrays, typically result in hundreds of genes potentially relevant to the process under study, rendering the interpr...
Rob Jelier, Guido Jenster, Lambert C. J. Dorssers,...