Sciweavers

155 search results - page 15 / 31
» Flexible Aliasing with Protection
Sort
View
ICDE
2006
IEEE
176views Database» more  ICDE 2006»
14 years 9 months ago
Mondrian Multidimensional K-Anonymity
K-Anonymity has been proposed as a mechanism for protecting privacy in microdata publishing, and numerous recoding "models" have been considered for achieving kanonymity...
Kristen LeFevre, David J. DeWitt, Raghu Ramakrishn...
CCS
2010
ACM
13 years 8 months ago
On the (in)security of IPsec in MAC-then-encrypt configurations
IPsec allows a huge amount of flexibility in the ways in which its component cryptographic mechanisms can be combined to build a secure communications service. This may be good fo...
Jean Paul Degabriele, Kenneth G. Paterson
COMCOM
2006
99views more  COMCOM 2006»
13 years 7 months ago
Applying 4-regular grid structures in large-scale access networks
4-Regular grid structures have been used in multiprocessor systems for decades due to a number of nice properties with regard to routing, protection, and restoration, together wit...
Jens Myrup Pedersen, Ahmed Patel, Thomas Phillip K...
MICRO
2010
IEEE
132views Hardware» more  MICRO 2010»
13 years 5 months ago
Parichute: Generalized Turbocode-Based Error Correction for Near-Threshold Caches
Energy efficiency is a primary concern for microprocessor designers. A very effective approach to improving the energy efficiency of a chip is to lower its supply voltage to very ...
Timothy N. Miller, Renji Thomas, James Dinan, Bruc...
ICDCS
2009
IEEE
13 years 5 months ago
Fragmentation Design for Efficient Query Execution over Sensitive Distributed Databases
The balance between privacy and utility is a classical problem with an increasing impact on the design of modern information systems. On the one side it is crucial to ensure that ...
Valentina Ciriani, Sabrina De Capitani di Vimercat...