Sciweavers

1064 search results - page 137 / 213
» Cryptography from Anonymity
Sort
View
IPPS
2000
IEEE
14 years 2 months ago
Self-Stabilizing Mutual Exclusion Using Unfair Distributed Scheduler
A self-stabilizing algorithm, regardless of the initial system state, converges in finite time to a set of states that satisfy a legitimacy predicate without the need for explici...
Ajoy Kumar Datta, Maria Gradinariu, Sébasti...
ICDM
2007
IEEE
138views Data Mining» more  ICDM 2007»
14 years 2 months ago
Preserving Privacy through Data Generation
Many databases will not or can not be disclosed without strong guarantees that no sensitive information can be extracted. To address this concern several data perturbation techniq...
Jilles Vreeken, Matthijs van Leeuwen, Arno Siebes
CIKM
2008
Springer
14 years 10 days ago
Efficient techniques for document sanitization
Sanitization of a document involves removing sensitive information from the document, so that it may be distributed to a broader audience. Such sanitization is needed while declas...
Venkatesan T. Chakaravarthy, Himanshu Gupta, Prasa...
CISC
2008
Springer
152views Cryptology» more  CISC 2008»
14 years 10 days ago
Privacy for Private Key in Signatures
One of the important applications of digital signature is anonymous credential or pseudonym system. In these scenarios, it is essential that the identity of the signer is kept secr...
Qianhong Wu, Bo Qin, Yi Mu, Willy Susilo
PAM
2010
Springer
14 years 9 days ago
A First Look at Mobile Hand-Held Device Traffic
Abstract. Although mobile hand-held devices (MHDs) are ubiquitous today, little is know about how they are used--especially at home. In this paper, we cast a first look on mobile h...
Gregor Maier, Fabian Schneider, Anja Feldmann