Sciweavers

274 search results - page 34 / 55
» Protecting location privacy against inference attacks
Sort
View
257
Voted
ICDE
2009
IEEE
1081views Database» more  ICDE 2009»
16 years 9 months ago
Modeling and Integrating Background Knowledge in Data Anonymization
Recent work has shown the importance of considering the adversary’s background knowledge when reasoning about privacy in data publishing. However, it is very difficult for the d...
Tiancheng Li, Ninghui Li, Jian Zhang
103
Voted
ACISP
2009
Springer
15 years 2 months ago
Measurement Study on Malicious Web Servers in the .nz Domain
Client-side attacks have become an increasing problem on the Internet today. Malicious web pages launch so-called drive-by-download attacks that are capable to gain complete contro...
Christian Seifert, Vipul Delwadia, Peter Komisarcz...
68
Voted
CCS
2008
ACM
14 years 11 months ago
Using rhythmic nonces for puzzle-based DoS resistance
To protect against replay attacks, many Internet protocols rely on nonces to guarantee freshness. In practice, the server generates these nonces during the initial handshake, but ...
Ellick Chan, Carl A. Gunter, Sonia Jahid, Evgeni P...
SIGMOD
2008
ACM
189views Database» more  SIGMOD 2008»
15 years 9 months ago
Dynamic anonymization: accurate statistical analysis with privacy preservation
A statistical database (StatDB) retrieves only aggregate results, as opposed to individual tuples. This paper investigates the construction of a privacy preserving StatDB that can...
Xiaokui Xiao, Yufei Tao
GLOBECOM
2010
IEEE
14 years 7 months ago
Practical Defenses for Evil Twin Attacks in 802.11
Open-access 802.11 wireless networks are commonly deployed in cafes, bookstores, and other public spaces to provide free Internet connectivity. These networks are convenient to dep...
Harold Gonzales, Kevin S. Bauer, Janne Lindqvist, ...