Sciweavers

1216 search results - page 115 / 244
» Online Prediction with Privacy
Sort
View
ESORICS
2010
Springer
13 years 11 months ago
Kamouflage: Loss-Resistant Password Management
We introduce Kamouflage: a new architecture for building theft-resistant password managers. An attacker who steals a laptop or cell phone with a Kamouflage-based password manager i...
Hristo Bojinov, Elie Bursztein, Xavier Boyen, Dan ...
CCS
2010
ACM
13 years 10 months ago
Dissent: accountable anonymous group messaging
Users often wish to participate in online groups anonymously, but misbehaving users may abuse this anonymity to disrupt the group's communication. Existing messaging protocol...
Henry Corrigan-Gibbs, Bryan Ford
TRUSTBUS
2010
Springer
13 years 8 months ago
Safe and Efficient Strategies for Updating Firewall Policies
Abstract. Due to the large size and complex structure of modern networks, firewall policies can contain several thousand rules. The size and complexity of these policies require au...
Zeeshan Ahmed, Abdessamad Imine, Michaël Rusi...
ICDE
2012
IEEE
221views Database» more  ICDE 2012»
12 years 22 days ago
DPCube: Releasing Differentially Private Data Cubes for Health Information
—We demonstrate DPCube, a component in our Health Information DE-identification (HIDE) framework, for releasing differentially private data cubes (or multi-dimensional histogram...
Yonghui Xiao, James J. Gardner, Li Xiong
CHI
2004
ACM
14 years 10 months ago
Social learning through gaming
This position paper describes the implementation and initial findings of a game called Personal Investigator (PI). PI is an online 3D detective game that implements a model of Bri...
Elaine M. Raybourn, Annika Wærn