Sciweavers

337 search results - page 61 / 68
» A Condensation Approach to Privacy Preserving Data Mining
Sort
View
CSFW
2000
IEEE
14 years 12 days ago
Confidentiality for Mobile Code: The Case of a Simple Payment Protocol
We propose an approach to support confidentiality for mobile implementations of security-sensitive protocols using Java/JVM. An applet which receives and passes on confidential in...
Mads Dam, Pablo Giambiagi
WSDM
2010
ACM
204views Data Mining» more  WSDM 2010»
14 years 3 months ago
Learning URL patterns for webpage de-duplication
Presence of duplicate documents in the World Wide Web adversely affects crawling, indexing and relevance, which are the core building blocks of web search. In this paper, we pres...
Hema Swetha Koppula, Krishna P. Leela, Amit Agarwa...
ESORICS
2009
Springer
14 years 1 days ago
Medical Image Integrity Control Combining Digital Signature and Lossless Watermarking
Enforcing protection of medical content becomes a major issue of computer security. Since medical contents are more and more widely distributed, it is necessary to develop security...
Wei Pan, Gouenou Coatrieux, Nora Cuppens-Boulahia,...
KDD
2006
ACM
121views Data Mining» more  KDD 2006»
14 years 9 months ago
Query-time entity resolution
The goal of entity resolution is to reconcile database references corresponding to the same real-world entities. Given the abundance of publicly available databases where entities...
Indrajit Bhattacharya, Lise Getoor, Louis Licamele
SDM
2010
SIAM
128views Data Mining» more  SDM 2010»
13 years 10 months ago
Publishing Skewed Sensitive Microdata
A highly skewed microdata contains some sensitive attribute values that occur far more frequently than others. Such data violates the "eligibility condition" assumed by ...
Yabo Xu, Ke Wang, Ada Wai-Chee Fu, Raymond Chi-Win...