Sciweavers

654 search results - page 66 / 131
» Privacy protection for RFID data
Sort
View
115
Voted
DAWAK
2006
Springer
15 years 4 months ago
Priority-Based k-Anonymity Accomplished by Weighted Generalisation Structures
Abstract. Biobanks are gaining in importance by storing large collections of patient's clinical data (e.g. disease history, laboratory parameters, diagnosis, life style) toget...
Konrad Stark, Johann Eder, Kurt Zatloukal
85
Voted
IWSEC
2007
Springer
15 years 6 months ago
Accredited Symmetrically Private Information Retrieval
Abstract. With the digitization of society and the continuous migration of services to the electronic world, individuals have lost significant control over their data. In this pap...
Mohamed Layouni
SDMW
2005
Springer
15 years 6 months ago
Experiments with Queries over Encrypted Data Using Secret Sharing
To avoid insider attacks one cannot rely on access control to protect a database scheme. Encrypting the database is a better option. This paper describes a working prototype of an ...
Richard Brinkman, Berry Schoenmakers, Jeroen Doume...
TRUST
2010
Springer
15 years 5 months ago
Robust Combiners for Software Hardening
All practical software hardening schemes, as well as practical encryption schemes, e.g., AES, were not proven to be secure. One technique to enhance security is robust combiners. A...
Amir Herzberg, Haya Shulman
106
Voted
CASCON
2006
109views Education» more  CASCON 2006»
15 years 2 months ago
Legal research topics within services sciences
The paper presents a study to define some of the most important legal topics that need to be included in the Services Sciences' research agenda. To analyze what sort of legal...
Olli Pitkänen