The rapid development of computer network technologies and social informationalization has brought many new opportunities and challenges in information security. With improved info...
The lack of trust amongst consumers and concerns about disclosing personal information are commonly seen as a major impediment to the growth of e-commerce. This is a consequence o...
Secure Function Evaluation (SFE) protocols are very hard to design, and reducibility has been recognized as a highly desirable property of SFE protocols. Informally speaking, reduc...
— During an emergency response, access to a reliable communication infrastructure is required to exchange accurate information in a timely manner. Various communication technolog...
Randomization has emerged as a useful technique for data disguising in privacy-preserving data mining. Its privacy properties have been studied in a number of papers. Kargupta et ...