Sciweavers

69 search results - page 8 / 14
» Protected IP-core test generation
Sort
View
HUC
2009
Springer
15 years 2 months ago
Privately querying location-based services with SybilQuery
To usefully query a location-based service, a mobile device must typically present its own location in its query to the server. This may not be acceptable to clients that wish to ...
Pravin Shankar, Vinod Ganapathy, Liviu Iftode
TDP
2008
160views more  TDP 2008»
14 years 9 months ago
Enhanced P-Sensitive K-Anonymity Models for Privacy Preserving Data Publishing
Publishing data for analysis from a micro data table containing sensitive attributes, while maintaining individual privacy, is a problem of increasing significance today. The k-ano...
Xiaoxun Sun, Hua Wang, Jiuyong Li, Traian Marius T...
WCE
2007
14 years 10 months ago
Experimental Study on Lightning Characteristics of Electronic Equipment's Power Supply
—Lightning protection for power supply of electronic equipment is an important problem of low-voltage lightning protection systems. In this paper, lightning characteristics of el...
Chai Yajing, Zhou Wenjun, He Ruidong, Zhao Luxing
GLOBECOM
2007
IEEE
15 years 3 months ago
Addressing the Weakness in a Lightweight RFID Tag-Reader Mutual Authentication Scheme
— A lightweight radio frequency identification (RFID) tag-reader mutual authentication scheme was recently proposed as an improvement over the original authentication protocol s...
Tong-Lee Lim, Tieyan Li
JIB
2007
88views more  JIB 2007»
14 years 9 months ago
Achieving k-anonymity in DataMarts used for gene expressions exploitation
Gene expression profiling is a sophisticated method to discover differences in activation patterns of genes between different patient collectives. By reasonably defining patient...
Konrad Stark, Johann Eder, Kurt Zatloukal