Sciweavers

6907 search results - page 917 / 1382
» Securing distributed adaptation
Sort
View
396
Voted
ICDE
2007
IEEE
1577views Database» more  ICDE 2007»
17 years 3 months ago
t-Closeness: Privacy Beyond k-Anonymity and l-Diversity
The k-anonymity privacy requirement for publishing microdata requires that each equivalence class (i.e., a set of records that are indistinguishable from each other with respect to...
Ninghui Li, Tiancheng Li, Suresh Venkatasubramania...
102
Voted
WWW
2009
ACM
16 years 4 months ago
A hybrid phish detection approach by identity discovery and keywords retrieval
Phishing is a significant security threat to the Internet, which causes tremendous economic loss every year. In this paper, we proposed a novel hybrid phish detection method based...
Guang Xiang, Jason I. Hong
130
Voted
PKC
2009
Springer
131views Cryptology» more  PKC 2009»
16 years 4 months ago
Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys
At Crypto'07, Goyal introduced the concept of Accountable Authority Identity-Based Encryption as a convenient tool to reduce the amount of trust in authorities in Identity-Bas...
Benoît Libert, Damien Vergnaud
158
Voted
PERCOM
2006
ACM
16 years 3 months ago
Context and Location-Aware Encryption for Pervasive Computing Environments
Pervasive computing promises to revolutionize computing, empower mobile users, and enhance mobility, customizability and adaptability of computing environments. Intrinsic to the n...
Jalal Al-Muhtadi, Raquel L. Hill, Roy H. Campbell,...
123
Voted
ICDE
2009
IEEE
129views Database» more  ICDE 2009»
15 years 10 months ago
A Static Analysis Framework for Database Applications
—Database developers today use data access APIs such as ADO.NET to execute SQL queries from their application. These applications often have security problems such as SQL injecti...
Arjun Dasgupta, Vivek R. Narasayya, Manoj Syamala