Sciweavers

796 search results - page 111 / 160
» The Anonymous Subgraph Problem
Sort
View
ICDE
2009
IEEE
392views Database» more  ICDE 2009»
16 years 11 months ago
FF-Anonymity: When Quasi-Identifiers Are Missing
Existing approaches on privacy-preserving data publishing rely on the assumption that data can be divided into quasi-identifier attributes (QI) and sensitive attribute (SA). This ...
Ada Wai-Chee Fu, Ke Wang, Raymond Chi-Wing Wong, Y...
ICDE
2009
IEEE
141views Database» more  ICDE 2009»
16 years 1 months ago
Privacy Preserving Publishing on Multiple Quasi-identifiers
In some applications of privacy preserving data publishing, a practical demand is to publish a data set on multiple quasi-identifiers for multiple users simultaneously, which poses...
Jian Pei, Yufei Tao, Jiexing Li, Xiaokui Xiao
P2P
2008
IEEE
15 years 6 months ago
Transaction Rate Limiters for Peer-to-Peer Systems
We introduce transaction rate limiters, new mechanisms that limit (probabilistically) the maximum number of transactions a user of a peer-to-peer system can do in any given period...
Marcos Kawazoe Aguilera, Mark Lillibridge, Xiaozho...
WECWIS
2006
IEEE
106views ECommerce» more  WECWIS 2006»
15 years 5 months ago
Transactions in Distributed Event-Based Middleware
Distributed event-based middleware (DEBM) provides a basis for the interoperation of autonomous components in large-scale systems. Transactions ensure the atomic and reliable exec...
Luis Vargas, Jean Bacon, Ken Moody
CTRSA
2005
Springer
121views Cryptology» more  CTRSA 2005»
15 years 5 months ago
Time-Selective Convertible Undeniable Signatures
Undeniable signatures were introduced in 1989 by Chaum and van Antwerpen to limit the self-authenticating property of digital signatures. An extended concept – the convertible un...
Fabien Laguillaumie, Damien Vergnaud