Sciweavers

98 search results - page 7 / 20
» An information theoretic approach for privacy metrics
Sort
View
PAKDD
2009
ACM
134views Data Mining» more  PAKDD 2009»
14 years 5 months ago
On Link Privacy in Randomizing Social Networks.
Many applications of social networks require relationship anonymity due to the sensitive, stigmatizing, or confidential nature of relationship. Recent work showed that the simple ...
Xiaowei Ying, Xintao Wu
ESAS
2007
Springer
14 years 14 days ago
On the Effectiveness of Changing Pseudonyms to Provide Location Privacy in VANETs
The promise of vehicular communications is to make road traffic safer and more efficient. However, besides the expected benefits, vehicular communications also introduce some priva...
Levente Buttyán, Tamás Holczer, Istv...
SIGMOD
2009
ACM
137views Database» more  SIGMOD 2009»
14 years 8 months ago
Privacy preservation of aggregates in hidden databases: why and how?
Many websites provide form-like interfaces which allow users to execute search queries on the underlying hidden databases. In this paper, we explain the importance of protecting s...
Arjun Dasgupta, Nan Zhang, Gautam Das, Surajit Cha...
ACSAC
2003
IEEE
14 years 1 months ago
Practical Random Number Generation in Software
There is a large gap between the theory and practice for random number generation. For example, on most operating systems, using /dev/random to generate a 256-bit AES key is highl...
John Viega
KDD
2004
ACM
159views Data Mining» more  KDD 2004»
14 years 1 months ago
Optimal randomization for privacy preserving data mining
Randomization is an economical and efficient approach for privacy preserving data mining (PPDM). In order to guarantee the performance of data mining and the protection of individ...
Michael Yu Zhu, Lei Liu