Sciweavers

654 search results - page 83 / 131
» Privacy protection for RFID data
Sort
View
86
Voted
ACSAC
2003
IEEE
15 years 5 months ago
Log Correlation for Intrusion Detection: A Proof of Concept
Intrusion detection is an important part of networkedsystems security protection. Although commercial products exist, finding intrusions has proven to be a difficult task with l...
Cristina Abad, Jed Taylor, Cigdem Sengul, William ...
83
Voted
ACSAC
2009
IEEE
15 years 7 months ago
Surgically Returning to Randomized lib(c)
—To strengthen systems against code injection attacks, the write or execute only policy (W⊕X) and address space layout randomization (ASLR) are typically used in combination. T...
Giampaolo Fresi Roglia, Lorenzo Martignoni, Robert...
82
Voted
GIL
2010
14 years 10 months ago
Precision Farming also for Small Scale Farmers
: The current and future food insecurity situation of many nations has been effected by factors like global warming, population growth, bio-energy, low technology acceptance, unfav...
Walter H. Mayer
CCS
2009
ACM
15 years 7 months ago
Privacy-preserving genomic computation through program specialization
In this paper, we present a new approach to performing important classes of genomic computations (e.g., search for homologous genes) that makes a significant step towards privacy...
Rui Wang, XiaoFeng Wang, Zhou Li, Haixu Tang, Mich...
ICDM
2006
IEEE
93views Data Mining» more  ICDM 2006»
15 years 6 months ago
Comparisons of K-Anonymization and Randomization Schemes under Linking Attacks
Recently K-anonymity has gained popularity as a privacy quantification against linking attacks, in which attackers try to identify a record with values of some identifying attrib...
Zhouxuan Teng, Wenliang Du