Sciweavers

274 search results - page 14 / 55
» Protecting location privacy against inference attacks
Sort
View
ICDE
2008
IEEE
154views Database» more  ICDE 2008»
15 years 10 months ago
Butterfly: Protecting Output Privacy in Stream Mining
Abstract-- Privacy preservation in data mining demands protecting both input and output privacy. The former refers to sanitizing the raw data itself before performing mining. The l...
Ting Wang, Ling Liu
CRYPTO
2003
Springer
87views Cryptology» more  CRYPTO 2003»
15 years 2 months ago
Private Circuits: Securing Hardware against Probing Attacks
Can you guarantee secrecy even if an adversary can eavesdrop on your brain? We consider the problem of protecting privacy in circuits, when faced with an adversary that can access ...
Yuval Ishai, Amit Sahai, David Wagner
SAC
2009
ACM
15 years 2 months ago
A taxonomy and adversarial model for attacks against network log anonymization
In recent years, it has become important for researchers, security incident responders and educators to share network logs, and many log anonymization tools and techniques have be...
Justin King, Kiran Lakkaraju, Adam J. Slagell
INFOCOM
2008
IEEE
15 years 3 months ago
ALPACAS: A Large-Scale Privacy-Aware Collaborative Anti-Spam System
— While the concept of collaboration provides a natural defense against massive spam emails directed at large numbers of recipients, designing effective collaborative anti-spam s...
Zhenyu Zhong, Lakshmish Ramaswamy, Kang Li
91
Voted
PERVASIVE
2005
Springer
15 years 3 months ago
A Formal Model of Obfuscation and Negotiation for Location Privacy
Obfuscation concerns the practice of deliberately degrading the quality of information in some way, so as to protect the privacy of the individual to whom that information refers. ...
Matt Duckham, Lars Kulik