Sciweavers

268 search results - page 17 / 54
» An Adaptive Multiparty Protocol for Secure Data Protection
Sort
View
ISLPED
2003
ACM
197views Hardware» more  ISLPED 2003»
14 years 1 months ago
Analyzing the energy consumption of security protocols
Security is critical to a wide range of wireless data applications and services. While several security mechanisms and protocols have been developed in the context of the wired In...
Nachiketh R. Potlapally, Srivaths Ravi, Anand Ragh...
ACISP
2005
Springer
14 years 1 months ago
Traversing Middleboxes with the Host Identity Protocol
The limited flexibility of the Internet to support mobility has motivated many researchers to look for alternative architectures. One such effort that combines security and multi...
Hannes Tschofenig, Andrei Gurtov, Jukka Ylitalo, A...
CCS
2010
ACM
13 years 6 months ago
PriMa: an effective privacy protection mechanism for social networks
In this paper, we propose PriMa (Privacy Manager), a privacy protection mechanism which supports semi-automated generation of access rules for users’ profile information. PriMa...
Anna Cinzia Squicciarini, Federica Paci, Smitha Su...
SDM
2008
SIAM
135views Data Mining» more  SDM 2008»
13 years 9 months ago
Preemptive Measures against Malicious Party in Privacy-Preserving Data Mining
Currently, many privacy-preserving data mining (PPDM) algorithms assume the semi-honest model and/or malicious model of multi-party interaction. However, both models are far from ...
Shuguo Han, Wee Keong Ng
ACSAC
2006
IEEE
14 years 1 months ago
Protecting Privacy in Key-Value Search Systems
This paper investigates the general problem of performing key-value search at untrusted servers without loss of user privacy. Specifically, given key-value pairs from multiple ow...
Yinglian Xie, Michael K. Reiter, David R. O'Hallar...