Sciweavers

1779 search results - page 126 / 356
» A Formal Model of Data Privacy
Sort
View
114
Voted
EUROPKI
2007
Springer
15 years 8 months ago
Time Capsule Signature: Efficient and Provably Secure Constructions
Time Capsule Signature, first formalized by Dodis and Yum in Financial Cryptography 2005, is a digital signature scheme which allows a signature to bear a (future) time t so that t...
Bessie C. Hu, Duncan S. Wong, Qiong Huang, Guomin ...
ADMA
2008
Springer
114views Data Mining» more  ADMA 2008»
15 years 10 months ago
Using Data Mining Methods to Predict Personally Identifiable Information in Emails
Private information management and compliance are important issues nowadays for most of organizations. As a major communication tool for organizations, email is one of the many pot...
Liqiang Geng, Larry Korba, Xin Wang, Yunli Wang, H...
DATE
2005
IEEE
144views Hardware» more  DATE 2005»
15 years 10 months ago
Context Sensitive Performance Analysis of Automotive Applications
Accurate timing analysis is key to efficient embedded system synthesis and integration. While industrial control software systems are developed using graphical models, such as Ma...
Jan Staschulat, Rolf Ernst, Andreas Schulze, Fabia...
SPW
2004
Springer
15 years 9 months ago
Safe and Private Data Sharing with Turtle: Friends Team-Up and Beat the System
In this paper we describe Turtle, a peer-to-peer architecture for safe sharing of sensitive data. The truly revolutionary aspect of Turtle rests in its novel way of dealing with t...
Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenba...
HAIS
2009
Springer
15 years 9 months ago
An Evolutionary Ensemble-Based Method for Rule Extraction with Distributed Data
This paper presents a methodology for knowledge discovery from inherently distributed data without moving it from its original location, completely or partially, to other locations...
Diego M. Escalante, Miguel Angel Rodriguez, Antoni...