Sciweavers

130 search results - page 12 / 26
» Location Privacy Protection Through Obfuscation-Based Techni...
Sort
View
IEEEIAS
2007
IEEE
14 years 1 months ago
Protection of Mammograms Using Blind Steganography and Watermarking
As medical image databases are connected together through PACS, those medical images may suffer from security breaches if not protected. If a medical image is illegally obtained o...
Yue Li, Chang-Tsun Li, Chia-Hung Wei
PAISI
2007
Springer
14 years 1 months ago
Informed Recognition in Software Watermarking
Software watermarking is a technique to protect programs from piracy through embedding secret information into the programs. As software unauthorized use and modification are ubiq...
William Zhu
PERCOM
2010
ACM
13 years 6 months ago
Privacy assurance in mobile sensing networks: Go beyond trusted servers
—Mobile devices are becoming the largest sensor network around the world. They could be used to collect a large amount of data with little effort and cost which is leading to a p...
Ling Hu, Cyrus Shahabi
IEEEARES
2006
IEEE
14 years 1 months ago
Securing DNS Services through System Self Cleansing and Hardware Enhancements
-- Domain Name Systems (DNS) provide the mapping between easily-remembered host names and their IP addresses. Popular DNS implementations however contain vulnerabilities that are e...
Yih Huang, David Arsenault, Arun Sood
SIGMOD
2009
ACM
137views Database» more  SIGMOD 2009»
14 years 7 months ago
Privacy preservation of aggregates in hidden databases: why and how?
Many websites provide form-like interfaces which allow users to execute search queries on the underlying hidden databases. In this paper, we explain the importance of protecting s...
Arjun Dasgupta, Nan Zhang, Gautam Das, Surajit Cha...