Sciweavers

1402 search results - page 164 / 281
» Personalized privacy preservation
Sort
View
94
Voted
ICC
2009
IEEE
113views Communications» more  ICC 2009»
14 years 10 months ago
Using GMM and SVM-Based Techniques for the Classification of SSH-Encrypted Traffic
When employing cryptographic tunnels such as the ones provided by Secure Shell (SSH) to protect their privacy on the Internet, users expect two forms of protection. First, they aim...
Maurizio Dusi, Alice Este, Francesco Gringoli, Luc...
141
Voted
ESORICS
2011
Springer
14 years 12 days ago
Who Wrote This Code? Identifying the Authors of Program Binaries
Program authorship attribution—identifying a programmer based on stylistic characteristics of code—has practical implications for detecting software theft, digital forensics, a...
Nathan E. Rosenblum, Xiaojin Zhu, Barton P. Miller
178
Voted
ICDE
2012
IEEE
221views Database» more  ICDE 2012»
13 years 3 months ago
DPCube: Releasing Differentially Private Data Cubes for Health Information
—We demonstrate DPCube, a component in our Health Information DE-identification (HIDE) framework, for releasing differentially private data cubes (or multi-dimensional histogram...
Yonghui Xiao, James J. Gardner, Li Xiong

Publication
243views
17 years 12 days ago
Enabling Private Continuous Queries For Revealed User Locations
Existing location-based services provide specialized services to their customers based on the knowledge of their exact locations. With untrustworthy servers, location-based service...
Chi-Yin Chow, Mohamed F. Mokbel
CCS
2005
ACM
15 years 6 months ago
CPOL: high-performance policy evaluation
Policy enforcement is an integral part of many applications. Policies are often used to control access to sensitive information. Current policy specification languages give users ...
Kevin Borders, Xin Zhao, Atul Prakash