Sciweavers

1064 search results - page 150 / 213
» Cryptography from Anonymity
Sort
View
DMIN
2009
222views Data Mining» more  DMIN 2009»
13 years 7 months ago
P-Sensitive K-Anonymity for Social Networks
-- The proliferation of social networks, where individuals share private information, has caused, in the last few years, a growth in the volume of sensitive data being stored in th...
Roy Ford, Traian Marius Truta, Alina Campan
PERCOM
2011
ACM
13 years 1 months ago
Ranges of human mobility in Los Angeles and New York
—The advent of ubiquitous, mobile, personal devices creates an unprecedented opportunity to improve our understanding of human movement. In this work, we study human mobility in ...
Sibren Isaacman, Richard Becker, Ramón C&aa...
DSS
2011
13 years 25 days ago
Estimating the effect of word of mouth on churn and cross-buying in the mobile phone market with Markov logic networks
Abstract: Much has been written about word of mouth and customer behavior. Telephone call detail records provide a novel way to understand the strength of the relationship between ...
Torsten Dierkes, Martin Bichler, Ramayya Krishnan
ACC
2011
65views more  ACC 2011»
12 years 9 months ago
Measuring the Deployment Hiccups of DNSSEC
On May 5, 2010 the last step of the DNSSEC deployment on the 13 root servers was completed. DNSSEC is a set of security extensions on the traditional DNS protocol, that aim in prev...
Vasilis Pappas, Angelos D. Keromytis
ACNS
2008
Springer
132views Cryptology» more  ACNS 2008»
14 years 3 months ago
Generic Security-Amplifying Methods of Ordinary Digital Signatures
We describe two new paradigms on how to obtain ordinary signatures that are secure against existential forgery under adaptively chosen message attacks (fully-secure, in short), fro...
Jin Li, Kwangjo Kim, Fangguo Zhang, Duncan S. Wong