Sciweavers

8972 search results - page 47 / 1795
» Private Information Retrieval
Sort
View
OSDI
2006
ACM
15 years 11 months ago
Making Information Flow Explicit in HiStar
HiStar is a new operating system designed to minimize the amount of code that must be trusted. HiStar provides strict information flow control, which allows users to specify preci...
David Mazières, Eddie Kohler, Nickolai Zeld...
HICSS
2009
IEEE
105views Biometrics» more  HICSS 2009»
15 years 5 months ago
Note Taking and Note Sharing While Browsing Campaign Information
Participants were observed while searching and browsing the internet for campaign information in a mock-voting situation in three online note-taking conditions: No Notes, Private ...
Scott P. Robertson, Ravi K. Vatrapu, George Abraha...
CORR
2010
Springer
61views Education» more  CORR 2010»
14 years 11 months ago
Utility and Privacy of Data Sources: Can Shannon Help Conceal and Reveal Information?
Abstract-- The problem of private information "leakage" (inadvertently or by malicious design) from the myriad large centralized searchable data repositories drives the n...
Lalitha Sankar, S. Raj Rajagopalan, H. Vincent Poo...
IFIP
2009
Springer
15 years 3 months ago
Secure Information Flow for Distributed Systems
We present an abstract language for distributed systems of processes with local memory and private communication channels. Communication between processes is done via messaging. Th...
Rafael Alpízar, Geoffrey Smith
MMSEC
2004
ACM
95views Multimedia» more  MMSEC 2004»
15 years 4 months ago
An improved attack analysis on a public-key spread spectrum watermarking
We analyze the fingerprinting method in [1] and suggest attacks that are better than the ones presented therein. To do this, we observe and use some extra information available i...
Mustafa Kesal, Mehmet Kivanç Mihçak,...