Sciweavers

14824 search results - page 2792 / 2965
» Security - Introduction
Sort
View
384
Voted
ICDE
2007
IEEE
1577views Database» more  ICDE 2007»
17 years 2 months ago
t-Closeness: Privacy Beyond k-Anonymity and l-Diversity
The k-anonymity privacy requirement for publishing microdata requires that each equivalence class (i.e., a set of records that are indistinguishable from each other with respect to...
Ninghui Li, Tiancheng Li, Suresh Venkatasubramania...
129
Voted
ASPLOS
2012
ACM
13 years 10 months ago
ELI: bare-metal performance for I/O virtualization
Direct device assignment enhances the performance of guest virtual machines by allowing them to communicate with I/O devices without host involvement. But even with device assignm...
Abel Gordon, Nadav Amit, Nadav Har'El, Muli Ben-Ye...
133
Voted
CSCW
2012
ACM
13 years 10 months ago
Designing a social network to support the independence of young adults with autism
Independence is key to a successful transition to adulthood for individuals with autism. Social support is a crucial factor for achieving adaptive self-help life skills. In this p...
Hwajung Hong, Jennifer G. Kim, Gregory D. Abowd, R...
114
Voted
CTRSA
2012
Springer
229views Cryptology» more  CTRSA 2012»
13 years 10 months ago
Practical Realisation and Elimination of an ECC-Related Software Bug Attack
We analyse and exploit implementation features in OpenSSL version 0.9.8g which permit an attack against ECDH-based functionality. The attack, although more general, can recover the...
Billy Bob Brumley, Manuel Barbosa, Dan Page, Frede...
ICONFERENCE
2012
13 years 10 months ago
Online social networks in a post-Soviet state: how Hungarians protect and share on Facebook
As Facebook has become global, users from different cultural and socio-political contexts have joined the site. We present a case study investigating how both current and historic...
Blase Ur, Yang Wang
« Prev « First page 2792 / 2965 Last » Next »