Sciweavers

515 search results - page 65 / 103
» Measuring Voter-Controlled Privacy
Sort
View
TDP
2008
111views more  TDP 2008»
13 years 9 months ago
Statistical Disclosure Control for Microdata Using the R-Package sdcMicro
The demand for high quality microdata for analytical purposes has grown rapidly among researchers and the public over the last few years. In order to respect existing laws on data ...
Matthias Templ
TKDE
2008
119views more  TKDE 2008»
13 years 9 months ago
Anonymization by Local Recoding in Data with Attribute Hierarchical Taxonomies
Abstract--Individual privacy will be at risk if a published data set is not properly deidentified. k-Anonymity is a major technique to deidentify a data set. Among a number of k-an...
Jiuyong Li, Raymond Chi-Wing Wong, Ada Wai-Chee Fu...
TASLP
2002
79views more  TASLP 2002»
13 years 9 months ago
Perception-based partial encryption of compressed speech
Mobile multimedia applications, the focus of many forthcoming wireless services, increasingly demand low-power techniques implementing content protection and customer privacy. In t...
Antonio Servetti, Juan Carlos De Martin
JUCS
2008
132views more  JUCS 2008»
13 years 9 months ago
Searching ... in a Web
: Search engines--"web dragons"--are the portals through which we access society's treasure trove of information. They do not publish the algorithms they use to sort...
Ian H. Witten
CSE
2009
IEEE
13 years 7 months ago
Edge Anonymity in Social Network Graphs
Edges in social network graphs can model sensitive relationships. In this paper, we consider the problem of edges anonymity in graphs. We propose a probabilistic notion of edge ano...
Lijie Zhang, Weining Zhang