Abstract. The signaling traffic of a cellular network is rich of information related to the movements of its devices across cell boundaries. Thus, passive monitoring of anonymized ...
We identify proximity breach as a privacy threat specific to numerical sensitive attributes in anonymized data publication. Such breach occurs when an adversary concludes with hig...
: This paper presents the design criteria for an Intelligent User Interface to a search engine of an on-line document data base. The Interface is aimed at users that have little or...
Fuzzy hashing allows the discovery of potentially incriminating documents that may not be located using traditional hashing methods. The use of the fuzzy hash is much like the fuz...
While it is quite typical to deal with attributes of different data types in the visualization of heterogeneous, multivariate datasets, most existing techniques still focus on the ...
Wolfgang Freiler, Kresimir Matkovic, Helwig Hauser