Sciweavers

251 search results - page 36 / 51
» On privacy preservation against adversarial data mining
Sort
View
CCS
2007
ACM
14 years 1 months ago
Split-ballot voting: everlasting privacy with distributed trust
In this paper we propose a new voting protocol with desirable security properties. The voting stage of the protocol can be performed by humans without computers; it provides every...
Tal Moran, Moni Naor
ICDM
2009
IEEE
133views Data Mining» more  ICDM 2009»
14 years 2 months ago
On K-Means Cluster Preservation Using Quantization Schemes
This work examines under what conditions compression methodologies can retain the outcome of clustering operations. We focus on the popular k-Means clustering algorithm and we dem...
Deepak S. Turaga, Michail Vlachos, Olivier Versche...
ADC
2009
Springer
175views Database» more  ADC 2009»
14 years 2 months ago
Conditional Purpose Based Access Control Model for Privacy Protection
This paper presents a model for privacy preserving access control which is based on variety of purposes. Conditional purpose is applied along with allowed purpose and prohibited p...
Md. Enamul Kabir, Hua Wang
NDSS
2008
IEEE
14 years 2 months ago
Analyzing Privacy in Enterprise Packet Trace Anonymization
Accurate network measurement through trace collection is critical for advancing network design and for maintaining secure, reliable networks. Unfortunately, the release of network...
Bruno F. Ribeiro, Weifeng Chen, Gerome Miklau, Don...
INFOCOM
2011
IEEE
12 years 11 months ago
Privacy analysis of user association logs in a large-scale wireless LAN
User association logs collected from a large-scale wireless LAN record where and when a user has used the network. Such information plays an important role in wireless network res...
Keren Tan, Guanhua Yan, Jihwang Yeo, David Kotz