Sciweavers

901 search results - page 12 / 181
» On Anonymization of String Data
Sort
View
ICDE
2008
IEEE
125views Database» more  ICDE 2008»
15 years 3 months ago
On breaching enterprise data privacy through adversarial information fusion
— Data privacy is one of the key challenges faced by enterprises today. Anonymization techniques address this problem by sanitizing sensitive data such that individual privacy is...
Srivatsava Ranjit Ganta, Raj Acharya
JSW
2008
89views more  JSW 2008»
14 years 9 months ago
Secure Set Union and Bag Union Computation for Guaranteeing Anonymity of Distrustful Participants
Abstract-- The computation of the union operator for different distributed datasets involves two challenges when participants are curious and can even act malicious: guaranteeing a...
Stefan Böttcher, Sebastian Obermeier
ICDE
2003
IEEE
146views Database» more  ICDE 2003»
15 years 10 months ago
Distance Based Indexing for String Proximity Search
In many database applications involving string data, it is common to have near neighbor queries (asking for strings that are similar to a query string) or nearest neighbor queries...
Jai Macker, Murat Tasan, Süleyman Cenk Sahina...
KDD
2007
ACM
136views Data Mining» more  KDD 2007»
15 years 9 months ago
On string classification in data streams
Charu C. Aggarwal, Philip S. Yu
EUROSEC
2009
ACM
15 years 4 months ago
Deep packet anonymization
Network traces of Internet attacks are among the most valuable resources for network analysts and security researchers. However, organizations and researchers are usually reluctan...
Michalis Foukarakis, Demetres Antoniades, Michalis...