Sciweavers

1612 search results - page 163 / 323
» About models of security protocols
Sort
View
PET
2009
Springer
15 years 11 months ago
Vida: How to Use Bayesian Inference to De-anonymize Persistent Communications
We present the Vida family of abstractions of anonymous communication systems, model them probabilistically and apply Bayesian inference to extract patterns of communications and u...
George Danezis, Carmela Troncoso
SDM
2008
SIAM
135views Data Mining» more  SDM 2008»
15 years 5 months ago
Preemptive Measures against Malicious Party in Privacy-Preserving Data Mining
Currently, many privacy-preserving data mining (PPDM) algorithms assume the semi-honest model and/or malicious model of multi-party interaction. However, both models are far from ...
Shuguo Han, Wee Keong Ng
ICC
2007
IEEE
157views Communications» more  ICC 2007»
15 years 10 months ago
Secure Aggregation in Sensor Networks Using Neighborhood Watch
Abstract— Many sensor networks (SN) use in-network aggregation to minimize the amount of data transmitted by sensors. Unfortunately, aggregation makes the network more vulnerable...
Paul Rabinovich, Robert Simon
149
Voted
PAKDD
2010
ACM
182views Data Mining» more  PAKDD 2010»
15 years 8 months ago
Computation of Ratios of Secure Summations in Multi-party Privacy-Preserving Latent Dirichlet Allocation
In this paper, we focus our attention on the problem of computing the ratio of two numbers, both of which are the summations of the private numbers distributed in different parties...
Bin Yang, Hiroshi Nakagawa
ESORICS
2002
Springer
16 years 4 months ago
Formal Security Analysis with Interacting State Machines
We introduce the ISM approach, a framework for modeling and verifying reactive systems in a formal, even machine-checked, way. The framework has been developed for applications in ...
David von Oheimb, Volkmar Lotz