To release micro-data tables containing sensitive data, generalization algorithms are usually required for satisfying given privacy properties, such as k-anonymity and l-diversity....
Lei Zhang 0004, Lingyu Wang, Sushil Jajodia, Alexa...
—Disruption of electric power operations can be catastrophic on the national security and economy. Due to the complexity of widely dispersed assets and the interdependency betwee...
IT outsourcing is a viable option for organizations to maintain competitiveness and get the ability to focus on core competences. However, there are risks, such as handing over sen...
We provide new security proofs for PMAC, TMAC, and XCBC message authentication modes. The previous security bounds for these modes were σ2 /2n , where n is the block size in bits ...
Programming distributed data-intensive web and mobile applications is gratuitously hard. As the world is moving more and more towards the software as services model, we have to co...