Sciweavers

2217 search results - page 134 / 444
» A Data Privacy Taxonomy
Sort
View
106
Voted
ICCCN
2008
IEEE
15 years 10 months ago
A Preliminary Look at the Privacy of SSH Tunnels
— Secure Shell (SSH) tunnels are commonly used to provide two types of privacy protection to clear-text application protocols. First and foremost, they aim at protecting the priv...
Maurizio Dusi, Francesco Gringoli, Luca Salgarelli
113
Voted
ICDCS
2007
IEEE
15 years 10 months ago
Temporal Privacy in Wireless Sensor Networks
Although the content of sensor messages describing “events of interest” may be encrypted to provide confidentiality, the context surrounding these events may also be sensitiv...
Pandurang Kamat, Wenyuan Xu, Wade Trappe, Yanyong ...
131
Voted
PET
2005
Springer
15 years 9 months ago
High-Power Proxies for Enhancing RFID Privacy and Utility
A basic radio-frequency identification (RFID) tag is a small and inexpensive microchip that emits a static identifier in response to a query from a nearby reader. Basic tags of t...
Ari Juels, Paul F. Syverson, Daniel V. Bailey
132
Voted
KDD
2005
ACM
145views Data Mining» more  KDD 2005»
16 years 4 months ago
Using and Learning Semantics in Frequent Subgraph Mining
The search for frequent subgraphs is becoming increasingly important in many application areas including Web mining and bioinformatics. Any use of graph structures in mining, howev...
Bettina Berendt
116
Voted
CHI
2008
ACM
16 years 4 months ago
What drives content tagging: the case of photos on Flickr
We examine tagging behavior on Flickr, a public photosharing website. We build on previous qualitative research that exposed a taxonomy of tagging motivations, as well as on socia...
Oded Nov, Mor Naaman, Chen Ye