Sciweavers

1790 search results - page 246 / 358
» On Privacy Models for RFID
Sort
View
ISITA
2010
14 years 10 months ago
On attainment of the capacity of broadband quantum channel by wavelength division multiplexing
Recently, the exact solution of the capacity of an attenuated quantum channel which is a model of a long distance optical fiber channel was derived [V. Giovannetti, et al., Phys. R...
Yoshio Takamura, Shogo Usami, Tsuyoshi Sasaki Usud...
ACSAC
2003
IEEE
15 years 7 months ago
Bayesian Event Classification for Intrusion Detection
Intrusion detection systems (IDSs) attempt to identify attacks by comparing collected data to predefined signatures known to be malicious (misuse-based IDSs) or to a model of lega...
Christopher Krügel, Darren Mutz, William K. R...
CCS
2009
ACM
16 years 4 months ago
The union-split algorithm and cluster-based anonymization of social networks
Knowledge discovery on social network data can uncover latent social trends and produce valuable findings that benefit the welfare of the general public. A growing amount of resea...
Brian Thompson, Danfeng Yao
ICDE
2006
IEEE
176views Database» more  ICDE 2006»
16 years 5 months ago
Mondrian Multidimensional K-Anonymity
K-Anonymity has been proposed as a mechanism for protecting privacy in microdata publishing, and numerous recoding "models" have been considered for achieving kanonymity...
Kristen LeFevre, David J. DeWitt, Raghu Ramakrishn...
DCC
2005
IEEE
16 years 3 months ago
Signcryption with Non-interactive Non-repudiation
Signcryption [35] is a public key primitive that achieves the functionality of both an encryption scheme and a signature scheme simultaneously. It does this more efficiently than a...
John Malone-Lee