Sciweavers

3395 search results - page 600 / 679
» Computational Differential Privacy
Sort
View
154
Voted
ICDCS
2009
IEEE
15 years 1 months ago
Fragmentation Design for Efficient Query Execution over Sensitive Distributed Databases
The balance between privacy and utility is a classical problem with an increasing impact on the design of modern information systems. On the one side it is crucial to ensure that ...
Valentina Ciriani, Sabrina De Capitani di Vimercat...
145
Voted
BCSHCI
2009
15 years 1 months ago
Personality traits, usage patterns and information disclosure in online communities
Online communities of different types have become an important part of the daily internet life of many people within the last couple of years. Both research and business have show...
Johann Schrammel, Christina Köffel, Manfred T...
154
Voted
IAJIT
2011
14 years 10 months ago
Social Issues in wireless sensor networks with healthcare perspective
: The recent advances in Wireless Sensor Networks have given rise to many application areas in healthcare. It has produced new field of Wireless Body Area Networks. Using wearable ...
Moshaddique Al Ameen, Kyung Sup Kwak
237
Voted
TDSC
2011
14 years 10 months ago
Nymble: Blocking Misbehaving Users in Anonymizing Networks
—Anonymizing networks such as Tor allow users to access Internet services privately by using a series of routers to hide the client’s IP address from the server. The success of...
Patrick P. Tsang, Apu Kapadia, Cory Cornelius, Sea...
145
Voted
TDSC
2011
14 years 10 months ago
SAT: A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks
—Anonymity has received increasing attention in the literature due to the users’ awareness of their privacy nowadays. Anonymity provides protection for users to enjoy network s...
Jinyuan Sun, Chi Zhang, Yanchao Zhang, Yuguang Fan...