Sciweavers

184 search results - page 23 / 37
» A TMDM Disclosure Using T
Sort
View
JLBS
2008
82views more  JLBS 2008»
13 years 7 months ago
Leveraging explicitly disclosed location information to understand tourist dynamics: a case study
In recent years, the large deployment of mobile devices has led to a massive increase in the volume of records of where people have been and when they were there. The analysis of t...
Fabien Girardin, Filippo Dal Fiore, Carlo Ratti, J...
INFOCOM
2010
IEEE
13 years 6 months ago
RIPPLE Authentication for Network Coding
Abstract—By allowing routers to randomly mix the information content in packets before forwarding them, network coding can maximize network throughput in a distributed manner wit...
Yaping Li, Hongyi Yao, Minghua Chen, Sidharth Jagg...
RFIDSEC
2010
13 years 6 months ago
Cryptanalysis of the David-Prasad RFID Ultralightweight Authentication Protocol
In September 2009, David and Prasad proposed at MobiSec’09 an interesting new ultralightweight mutual authentication protocol for low-cost RFID tags. In this paper, we present a ...
Julio César Hernández Castro, Pedro ...
SAC
2006
ACM
14 years 1 months ago
On the use of spectral filtering for privacy preserving data mining
Randomization has been a primary tool to hide sensitive private information during privacy preserving data mining.The previous work based on spectral filtering, show the noise ma...
Songtao Guo, Xintao Wu
ICDM
2009
IEEE
143views Data Mining» more  ICDM 2009»
14 years 2 months ago
An Attack on the Privacy of Sanitized Data that Fuses the Outputs of Multiple Data Miners
Abstract—Data sanitization has been used to restrict reidentification of individuals and disclosure of sensitive information from published data. We propose an attack on the pri...
Michal Sramka, Reihaneh Safavi-Naini, Jörg De...