Sciweavers

1398 search results - page 153 / 280
» Medical Database Security
Sort
View
ALGORITHMICA
2004
132views more  ALGORITHMICA 2004»
15 years 4 months ago
A General Model for Authenticated Data Structures
Query answers from on-line databases can easily be corrupted by hackers or malicious database publishers. Thus it is important to provide mechanisms which allow clients to trust th...
Charles U. Martel, Glen Nuckolls, Premkumar T. Dev...
CIKM
2009
Springer
15 years 10 months ago
Walking in the crowd: anonymizing trajectory data for pattern analysis
Recently, trajectory data mining has received a lot of attention in both the industry and the academic research. In this paper, we study the privacy threats in trajectory data pub...
Noman Mohammed, Benjamin C. M. Fung, Mourad Debbab...
CIKM
2009
Springer
15 years 10 months ago
A framework for safely publishing communication traces
A communication trace is a detailed record of the communication between two entities. Communication traces are vital for research in computer networks and protocols in many domain...
Abhinav Parate, Gerome Miklau
SDMW
2004
Springer
15 years 9 months ago
Using Secret Sharing for Searching in Encrypted Data
When outsourcing data to an untrusted database server, the data should be encrypted. When using thin clients or low-bandwidth networks it is best to perform most of the work at the...
Richard Brinkman, Jeroen Doumen, Willem Jonker
DEXAW
2003
IEEE
99views Database» more  DEXAW 2003»
15 years 9 months ago
Handling Identity in Peer-to-Peer Systems
Due to the limited number of available IP addresses most computers on the Internet use dynamic IP addresses which causes problems for applications that have to maintain routing ta...
Manfred Hauswirth, Anwitaman Datta, Karl Aberer