Sciweavers

175 search results - page 10 / 35
» Toward Privacy in Public Databases
Sort
View
85
Voted
ICDE
2010
IEEE
194views Database» more  ICDE 2010»
16 years 5 days ago
XColor: Protecting General Proximity Privacy
As a severe threat in anonymized data publication, proximity breach is gaining increasing attention. Such breach occurs when an attacker learns with high confidence that the sensit...
Ting Wang, Ling Liu
EVOTING
2004
171views Hardware» more  EVOTING 2004»
15 years 1 months ago
Towards Remote E-Voting: Estonian case
: This paper gives an overview about the Estonian e-voting system. Paper discusses how the concept of e-voting system is designed to resist some of the main challenges of remote e-...
Epp Maaten
93
Voted
ACSAC
2001
IEEE
15 years 4 months ago
A JCA-Based Implementation Framework for Threshold Cryptography
The Java Cryptography Architecture, JCA in short, was created to allow JCA-compliant cryptography providers to be plugged into a JCA-aware application at run time. This configurab...
Yih Huang, David Rine, Xunhua Wang
91
Voted
EUROSEC
2010
ACM
15 years 7 months ago
Differential privacy for collaborative security
Fighting global security threats with only a local view is inherently difficult. Internet network operators need to fight global phenomena such as botnets, but they are hampered...
Jason Reed, Adam J. Aviv, Daniel Wagner, Andreas H...
WPES
2003
ACM
15 years 5 months ago
Preserving privacy when preference searching in e-commerce
The idea of using user preferences to assist with information filtering and with providing the most “relevant” answers to queries has recently received some attention from th...
Rhys Smith, Jianhua Shao