: This paper describes foundational work investigating the protection requirements of sensitive medical information, which is being stored more routinely in repository systems for ...
Nathan Lea, Stephen Hailes, Tony Austin, Dipak Kal...
Identity management systems help users to organise their digital profiles in order to communicate parts of them, whenever needed and wanted, to communication partners like internet...
Abstract. Global energy generation and delivery systems are transitioning to a new computerized "smart grid". One of the principle components of the smart grid is an adva...
Stephen E. McLaughlin, Dmitry Podkuiko, Patrick Mc...
The popularity of micro-blogging has made generalpurpose information sharing a pervasive phenomenon. This trend is now impacting location sharing applications (LSAs) such that use...
Karen P. Tang, Jialiu Lin, Jason I. Hong, Daniel P...
Alice and Bob possess sequences x and y respectively and would like to compute the 1 distance, namely x - y 1 under privacy and communication constraints. The privacy constraint r...