Sciweavers

515 search results - page 24 / 103
» Measuring Voter-Controlled Privacy
Sort
View
CCS
2008
ACM
15 years 1 months ago
Reconsidering physical key secrecy: teleduplication via optical decoding
The access control provided by a physical lock is based on the assumption that the information content of the corresponding key is private -- that duplication should require eithe...
Benjamin Laxton, Kai Wang, Stefan Savage
CSSC
2010
121views more  CSSC 2010»
14 years 9 months ago
An Efficient Estimation for Switching Regression Models: A Monte Carlo Study
This paper investigates an efficient estimation method for a class of switching regressions based on the characteristic function (CF). We show that with the exponential weighting ...
Dinghai Xu
IMC
2007
ACM
15 years 1 months ago
Legal issues surrounding monitoring during network research
This work was motivated by a discussion that two of the coauthors (computer science professors) had with the other coauthor (a law professor and a former computer crime Trial Atto...
Douglas C. Sicker, Paul Ohm, Dirk Grunwald
ESORICS
2007
Springer
15 years 6 months ago
Fragmentation and Encryption to Enforce Privacy in Data Storage
Abstract. Privacy requirements have an increasing impact on the realization of modern applications. Technical considerations and many significant commercial and legal regulations ...
Valentina Ciriani, Sabrina De Capitani di Vimercat...
WWW
2009
ACM
16 years 17 days ago
Privacy diffusion on the web: a longitudinal perspective
For the last few years we have studied the diffusion of private information about users as they visit various Web sites triggering data gathering aggregation by third parties. Thi...
Balachander Krishnamurthy, Craig E. Wills