Sciweavers

222 search results - page 45 / 45
» Secure Content Delivery using Key Composition
Sort
View
SIGMOD
2005
ACM
128views Database» more  SIGMOD 2005»
15 years 11 months ago
Deriving Private Information from Randomized Data
Randomization has emerged as a useful technique for data disguising in privacy-preserving data mining. Its privacy properties have been studied in a number of papers. Kargupta et ...
Zhengli Huang, Wenliang Du, Biao Chen
PAM
2010
Springer
15 years 6 months ago
Network DVR: A Programmable Framework for Application-Aware Trace Collection
Network traces are essential for a wide range of network applications, including traffic analysis, network measurement, performance monitoring, and security analysis. Existing cap...
Chia-Wei Chang, Alexandre Gerber, Bill Lin, Subhab...