Sciweavers

2363 search results - page 341 / 473
» How Secure is RFID
Sort
View
KDD
2003
ACM
113views Data Mining» more  KDD 2003»
16 years 5 months ago
Using randomized response techniques for privacy-preserving data mining
Privacy is an important issue in data mining and knowledge discovery. In this paper, we propose to use the randomized response techniques to conduct the data mining computation. S...
Wenliang Du, Zhijun Zhan
PERCOM
2007
ACM
16 years 4 months ago
Identity-Based Encryption for Sensor Networks
In spite of several years of intense research, the area of security and cryptography in Wireless Sensor Networks (WSNs) still has a number of open problems. On the other hand, the...
Leonardo B. Oliveira, Ricardo Dahab, Julio L&oacut...
HICSS
2009
IEEE
124views Biometrics» more  HICSS 2009»
15 years 11 months ago
Case Studies of an Insider Framework
Many groups are interested in the insider threat problem, but the model generally used by all of these groups is implicitly binary—one is either within a perimeter or not. There...
Matt Bishop, Sophie Engle, Sean Peisert, Sean Whal...
115
Voted
ICDAR
2009
IEEE
15 years 11 months ago
Document Analysis Support for the Manual Auditing of Elections
Recent developments have resulted in dramatic changes in the way elections are conducted, both in the United States and around the world. Well-publicized flaws in the security of...
Daniel P. Lopresti, Xiang Zhou, Xiaolei Huang, Gan...
CLOUDCOM
2009
Springer
15 years 11 months ago
Accountability as a Way Forward for Privacy Protection in the Cloud
: The issue of how to provide appropriate privacy protection for cloud computing is important, and as yet unresolved. In this paper we propose an approach in which procedural and t...
Siani Pearson, Andrew Charlesworth