Sciweavers

3395 search results - page 26 / 679
» Computational Differential Privacy
Sort
View
ENTCS
2008
120views more  ENTCS 2008»
13 years 9 months ago
Characterizing Computable Analysis with Differential Equations
Manuel Lameiras Campagnolo, Kerry Ojakian
PODS
2009
ACM
134views Database» more  PODS 2009»
14 years 10 months ago
Relationship privacy: output perturbation for queries with joins
We study privacy-preserving query answering over data containing relationships. A social network is a prime example of such data, where the nodes represent individuals and edges r...
Vibhor Rastogi, Michael Hay, Gerome Miklau, Dan Su...
ACSAC
2001
IEEE
14 years 1 months ago
Mitigating Distributed Denial of Service Attacks with Dynamic Resource Pricing
Distributed Denial of Service (DDoS) attacks exploit the acute imbalance between client and server workloads to cause devastation to the service providers. We propose a distribute...
David Mankins, Rajesh Krishnan, Ceilyn Boyd, John ...
ATAL
2005
Springer
14 years 3 months ago
The value of privacy: optimal strategies for privacy minded agents
Agents often want to protect private information, while at the same acting upon the information. These two desires are in conflict, and this conflict can be modeled in strategic...
Sieuwert van Otterloo