Sciweavers

770 search results - page 132 / 154
» Privacy Preserving Joins
Sort
View
ESORICS
2009
Springer
15 years 3 months ago
Medical Image Integrity Control Combining Digital Signature and Lossless Watermarking
Enforcing protection of medical content becomes a major issue of computer security. Since medical contents are more and more widely distributed, it is necessary to develop security...
Wei Pan, Gouenou Coatrieux, Nora Cuppens-Boulahia,...
CCS
2008
ACM
15 years 1 months ago
BootJacker: compromising computers using forced restarts
BootJacker is a proof-of-concept attack tool which demonstrates that authentication mechanisms employed by an operating system can be bypassed by obtaining physical access and sim...
Ellick Chan, Jeffrey C. Carlyle, Francis M. David,...
NIPS
2007
15 years 1 months ago
Compressed Regression
Recent research has studied the role of sparsity in high dimensional regression and signal reconstruction, establishing theoretical limits for recovering sparse models from sparse...
Shuheng Zhou, John D. Lafferty, Larry A. Wasserman
DKE
2008
106views more  DKE 2008»
14 years 12 months ago
Towards optimal k-anonymization
When releasing microdata for research purposes, one needs to preserve the privacy of respondents while maximizing data utility. An approach that has been studied extensively in re...
Tiancheng Li, Ninghui Li
CORR
2006
Springer
91views Education» more  CORR 2006»
14 years 11 months ago
SCRUB-PA: A Multi-Level Multi-Dimensional Anonymization Tool for Process Accounting
In the UNIX/Linux environment the kernel can log every command process created by every user using process accounting. This data has many potential uses, including the investigati...
Katherine Luo, Yifan Li, Charis Ermopoulos, Willia...