Sciweavers

151 search results - page 21 / 31
» Minimality Attack in Privacy Preserving Data Publishing
Sort
View
CCS
2005
ACM
14 years 1 months ago
Improving Brumley and Boneh timing attack on unprotected SSL implementations
Since the remarkable work of Kocher [7], several papers considering different types of timing attacks have been published. In 2003, Brumley and Boneh presented a timing attack on...
Onur Aciiçmez, Werner Schindler, Çet...
CSE
2009
IEEE
14 years 2 months ago
Noise Injection for Search Privacy Protection
Abstract—Extensive work has been devoted to private information retrieval and privacy preserving data mining. To protect user privacy from search engines, however, most current a...
Shaozhi Ye, Shyhtsun Felix Wu, Raju Pandey, Hao Ch...
ESORICS
2009
Springer
14 years 8 months ago
Keep a Few: Outsourcing Data While Maintaining Confidentiality
We put forward a novel paradigm for preserving privacy in data outsourcing which departs from encryption. The basic idea behind our proposal is to involve the owner in storing a li...
Valentina Ciriani, Sabrina De Capitani di Vimercat...
SIGMOD
2006
ACM
96views Database» more  SIGMOD 2006»
14 years 7 months ago
Injecting utility into anonymized datasets
Limiting disclosure in data publishing requires a careful balance between privacy and utility. Information about individuals must not be revealed, but a dataset should still be us...
Daniel Kifer, Johannes Gehrke
PERCOM
2010
ACM
13 years 6 months ago
Privacy assurance in mobile sensing networks: Go beyond trusted servers
—Mobile devices are becoming the largest sensor network around the world. They could be used to collect a large amount of data with little effort and cost which is leading to a p...
Ling Hu, Cyrus Shahabi