Sciweavers

1790 search results - page 86 / 358
» On Privacy Models for RFID
Sort
View
JAMIA
2011
140views more  JAMIA 2011»
14 years 8 months ago
Never too old for anonymity: a statistical standard for demographic data sharing via the HIPAA Privacy Rule
Objective Healthcare organizations must de-identify patient records before sharing data. Many organizations rely on the Safe Harbor Standard of the HIPAAPrivacy Rule, which enumer...
Bradley Malin, Kathleen Benitez, Daniel R. Masys
184
Voted
IDEAS
2005
IEEE
165views Database» more  IDEAS 2005»
15 years 11 months ago
Privacy Aware Data Generation for Testing Database Applications
Testing of database applications is of great importance. A significant issue in database application testing consists in the availability of representative data. In this paper we...
Xintao Wu, Chintan Sanghvi, Yongge Wang, Yuliang Z...
ASIACRYPT
2001
Springer
15 years 10 months ago
Key-Privacy in Public-Key Encryption
We consider a novel security requirement of encryption schemes that we call “key-privacy” or “anonymity”. It asks that an eavesdropper in possession of a ciphertext not be ...
Mihir Bellare, Alexandra Boldyreva, Anand Desai, D...
FUIN
2007
147views more  FUIN 2007»
15 years 5 months ago
Privacy Preserving Database Generation for Database Application Testing
Testing of database applications is of great importance. Although various studies have been conducted to investigate testing techniques for database design, relatively few efforts ...
Xintao Wu, Yongge Wang, Songtao Guo, Yuliang Zheng
COMPUTER
2007
123views more  COMPUTER 2007»
15 years 5 months ago
Cryptography on a Speck of Dust
Ubiquitous computing has become a reality in recent years. Tiny wireless sensors and RFID tags are being deployed today and will soon form an important aspect of our infrastructur...
Jens-Peter Kaps, Gunnar Gaubatz, Berk Sunar