Sciweavers

18374 search results - page 61 / 3675
» Applications for data hiding
Sort
View
TOG
2008
82views more  TOG 2008»
13 years 9 months ago
Phong Tessellation
Modern 3D engines used in real-time applications provide shading that hides the lack of higher order continuity inside the shapes using modulated normals, textures, and tone-mappi...
Tamy Boubekeur, Marc Alexa
EUROCRYPT
2001
Springer
14 years 2 months ago
The Bit Security of Paillier's Encryption Scheme and Its Applications
At EuroCrypt’99, Paillier proposed a new encryption scheme based on higher residuosity classes. The new scheme was proven to be one-way under the assumption that computing N-resi...
Dario Catalano, Rosario Gennaro, Nick Howgrave-Gra...
ICDE
2006
IEEE
176views Database» more  ICDE 2006»
14 years 3 months ago
Deriving Private Information from Perturbed Data Using IQR Based Approach
Several randomized techniques have been proposed for privacy preserving data mining of continuous data. These approaches generally attempt to hide the sensitive data by randomly m...
Songtao Guo, Xintao Wu, Yingjiu Li
DEXA
2005
Springer
93views Database» more  DEXA 2005»
14 years 3 months ago
Provable Data Privacy
In relational database systems a combination of privileges and views is employed to limit a user’s access and to hide non-public data. The data privacy problem is to decide wheth...
Kilian Stoffel, Thomas Studer
SAC
2006
ACM
14 years 3 months ago
On the use of spectral filtering for privacy preserving data mining
Randomization has been a primary tool to hide sensitive private information during privacy preserving data mining.The previous work based on spectral filtering, show the noise ma...
Songtao Guo, Xintao Wu