Sciweavers

796 search results - page 53 / 160
» The Anonymous Subgraph Problem
Sort
View
PROVSEC
2009
Springer
15 years 7 months ago
GUC-Secure Set-Intersection Computation
Secure set-intersection computation is one of important problems in secure multiparty computation with various applications. We propose a general construction for secure 2-party se...
Yuan Tian, Hao Zhang
INFORMATICALT
2006
116views more  INFORMATICALT 2006»
15 years 20 days ago
An Electronic Cash System Based on Group Blind Signatures
One important requirement of electronic cash systems is the anonymity of customers. Unconditional anonymity is also very well suited to support criminals in blackmailing. Maitland ...
Constantin Popescu
94
Voted
HICSS
2009
IEEE
96views Biometrics» more  HICSS 2009»
15 years 7 months ago
Vote Selling, Voter Anonymity, and Forensic Logging of Electronic Voting Machines
Much recent work has focused on the process of auditing the results of elections. Little work has focused on auditing the e-voting systems currently in use. The facilities for doi...
Sean Peisert, Matt Bishop, Alec Yasinsac
92
Voted
ICDM
2010
IEEE
142views Data Mining» more  ICDM 2010»
14 years 10 months ago
Anonymizing Temporal Data
-- Temporal data are time-critical in that the snapshot at each timestamp must be made available to researchers in a timely fashion. However, due to the limited data, each snapshot...
Ke Wang, Yabo Xu, Raymond Chi-Wing Wong, Ada Wai-C...
84
Voted
KDD
2006
ACM
132views Data Mining» more  KDD 2006»
16 years 1 months ago
Utility-based anonymization using local recoding
Privacy becomes a more and more serious concern in applications involving microdata. Recently, efficient anonymization has attracted much research work. Most of the previous metho...
Jian Xu, Wei Wang 0009, Jian Pei, Xiaoyuan Wang, B...