Sciweavers

2272 search results - page 260 / 455
» Provable Data Privacy
Sort
View
CCS
2003
ACM
15 years 9 months ago
Receiver anonymity via incomparable public keys
We describe a new method for protecting the anonymity of message receivers in an untrusted network. Surprisingly, existing methods fail to provide the required level of anonymity ...
Brent R. Waters, Edward W. Felten, Amit Sahai
FC
2006
Springer
94views Cryptology» more  FC 2006»
15 years 8 months ago
Private Policy Negotiation
With the increasing importance of correctly handling privacy-sensitive data, significant work has been put in expressing and enforcing privacy policies. Less work has been done ho...
Klaus Kursawe, Gregory Neven, Pim Tuyls
PAKDD
2009
ACM
225views Data Mining» more  PAKDD 2009»
15 years 8 months ago
Accurate Synthetic Generation of Realistic Personal Information
A large proportion of the massive amounts of data that are being collected by many organisations today is about people, and often contains identifying information like names, addre...
Peter Christen, Agus Pudjijono
ACSAC
2008
IEEE
15 years 10 months ago
PinUP: Pinning User Files to Known Applications
Users commonly download, patch, and use applications such as email clients, office applications, and media-players from the Internet. Such applications are run with the user’s ...
William Enck, Patrick Drew McDaniel, Trent Jaeger
BIOSURVEILLANCE
2007
Springer
15 years 10 months ago
Global Foot-and-Mouth Disease Surveillance Using BioPortal
Abstract. The paper presents a description of the FMD BioPortal biosurveillance system (http://fmd.ucdavis.edu/bioportal/) that is currently operating to capture, analyze, and diss...
Mark Thurmond, Andrés Perez, Chunju Tseng, ...