Sciweavers

1464 search results - page 19 / 293
» On optimal anonymization for l -diversity
Sort
View
PET
2007
Springer
15 years 6 months ago
Anonymity in the Wild: Mixes on Unstructured Networks
Abstract. As decentralized computing scenarios get ever more popular, unstructured topologies are natural candidates to consider running mix networks upon. We consider mix network ...
Shishir Nagaraja
DAWAK
2006
Springer
15 years 3 months ago
Achieving k-Anonymity by Clustering in Attribute Hierarchical Structures
Abstract. Individual privacy will be at risk if a published data set is not properly de-identified. k-anonymity is a major technique to de-identify a data set. A more general view ...
Jiuyong Li, Raymond Chi-Wing Wong, Ada Wai-Chee Fu...
SDM
2007
SIAM
204views Data Mining» more  SDM 2007»
15 years 1 months ago
Flexible Anonymization For Privacy Preserving Data Publishing: A Systematic Search Based Approach
k-anonymity is a popular measure of privacy for data publishing: It measures the risk of identity-disclosure of individuals whose personal information are released in the form of ...
Bijit Hore, Ravi Chandra Jammalamadaka, Sharad Meh...
GECCO
2005
Springer
137views Optimization» more  GECCO 2005»
15 years 5 months ago
An ant colony algorithm for multi-user detection in wireless communication systems
Samer L. Hijazi, Balasubramaniam Natarajan, Sanjoy...
GECCO
2005
Springer
108views Optimization» more  GECCO 2005»
15 years 5 months ago
An evolutionary algorithm to generate ellipsoid network intrusion detectors
Joseph M. Shapiro, Gary B. Lamont, Gilbert L. Pete...