Sciweavers

5255 search results - page 167 / 1051
» Formal Methods for Privacy
Sort
View
195
Voted
SIGMOD
2006
ACM
125views Database» more  SIGMOD 2006»
16 years 3 months ago
Personalized privacy preservation
We study generalization for preserving privacy in publication of sensitive data. The existing methods focus on a universal approach that exerts the same amount of preservation for...
Xiaokui Xiao, Yufei Tao
137
Voted
ESAS
2007
Springer
15 years 9 months ago
ALGSICS - Combining Physics and Cryptography to Enhance Security and Privacy in RFID Systems
RFID-tags can be seen as a new generation of bar codes with added functionality. They are becoming very popular tools for identification of products in various applications such a...
Neil Bird, Claudine Conrado, Jorge Guajardo, Stefa...
122
Voted
ICDM
2003
IEEE
98views Data Mining» more  ICDM 2003»
15 years 9 months ago
On the Privacy Preserving Properties of Random Data Perturbation Techniques
Privacy is becoming an increasingly important issue in many data mining applications. This has triggered the development of many privacy-preserving data mining techniques. A large...
Hillol Kargupta, Souptik Datta, Qi Wang, Krishnamo...
CCS
2000
ACM
15 years 8 months ago
Timing attacks on Web privacy
We describe a class of attacks that can compromise the privacy of users’ Web-browsing histories. The attacks allow a malicious Web site to determine whether or not the user has ...
Edward W. Felten, Michael A. Schneider
136
Voted
FM
1998
Springer
153views Formal Methods» more  FM 1998»
15 years 7 months ago
VSE: Controlling the Complexity in Formal Software Developments
We give an overview of the enhanced VSE system which is a tool to formally specify and verify systems. It provides means for structuring speci cations and it supports the developme...
Dieter Hutter, Heiko Mantel, Georg Rock, Werner St...