Sciweavers

654 search results - page 117 / 131
» Privacy protection for RFID data
Sort
View
SDM
2010
SIAM
183views Data Mining» more  SDM 2010»
14 years 11 months ago
GraSS: Graph Structure Summarization
Large graph databases are commonly collected and analyzed in numerous domains. For reasons related to either space efficiency or for privacy protection (e.g., in the case of socia...
Kristen LeFevre, Evimaria Terzi
DBSEC
2009
110views Database» more  DBSEC 2009»
14 years 11 months ago
Enforcing Confidentiality Constraints on Sensitive Databases with Lightweight Trusted Clients
Existing approaches for protecting sensitive information stored (outsourced) at external "honest-but-curious" servers are typically based on an overlying layer of encrypt...
Valentina Ciriani, Sabrina De Capitani di Vimercat...
TDP
2008
111views more  TDP 2008»
14 years 10 months ago
Statistical Disclosure Control for Microdata Using the R-Package sdcMicro
The demand for high quality microdata for analytical purposes has grown rapidly among researchers and the public over the last few years. In order to respect existing laws on data ...
Matthias Templ
CCS
2009
ACM
15 years 4 months ago
Multi-party off-the-record messaging
Most cryptographic algorithms provide a means for secret and authentic communication. However, under many circumstances, the ability to repudiate messages or deny a conversation i...
Ian Goldberg, Berkant Ustaoglu, Matthew Van Gundy,...
MINENET
2006
ACM
15 years 4 months ago
SC2D: an alternative to trace anonymization
Progress in networking research depends crucially on applying novel analysis tools to real-world traces of network activity. This often conflicts with privacy and security requir...
Jeffrey C. Mogul, Martin F. Arlitt