Sciweavers

230 search results - page 30 / 46
» On Anonymity with Identity Escrow
Sort
View
PERCOM
2005
ACM
14 years 7 months ago
A Capability-Based Privacy-Preserving Scheme for Pervasive Computing Environments
Pervasive computing is a future technology that provides a user with the capability to compute and communicate from everywhere. In a pervasive computing environment, a user interac...
Divyan M. Konidala, Dang Nguyen Duc, Dongman Lee, ...
DASFAA
2011
IEEE
341views Database» more  DASFAA 2011»
13 years 5 months ago
Utility-Oriented K-Anonymization on Social Networks
\Identity disclosure" problem on publishing social network data has gained intensive focus from academia. Existing k-anonymization algorithms on social network may result in n...
Yazhe WANG, Long XIE, Baihua ZHENG, and Ken C. K. ...
SIGMOD
2005
ACM
123views Database» more  SIGMOD 2005»
14 years 1 months ago
To Do or Not To Do: The Dilemma of Disclosing Anonymized Data
Decision makers of companies often face the dilemma of whether to release data for knowledge discovery, vis a vis the risk of disclosing proprietary or sensitive information. Whil...
Laks V. S. Lakshmanan, Raymond T. Ng, Ganesh Rames...
INFSOF
2006
81views more  INFSOF 2006»
13 years 7 months ago
A framework for anonymous but accountable self-organizing communities
In this paper we propose a novel architecture and approach to provide accountability for Web communities that require a high-level of privacy. A two-layered privacy protection arc...
Gábor Ziegler, Csilla Farkas, András...
STACS
2001
Springer
14 years 10 days ago
Gathering of Asynchronous Oblivious Robots with Limited Visibility
Abstract. We consider a collection of robots which are identical (anonymous), have limited visibility of the environment, and no memory of the past (oblivious); furthermore, they a...
Paola Flocchini, Giuseppe Prencipe, Nicola Santoro...