Sciweavers

1599 search results - page 177 / 320
» Probabilistic Analysis of Anonymity
Sort
View
VLDB
2009
ACM
165views Database» more  VLDB 2009»
14 years 8 months ago
Online pairing of VoIP conversations
This paper answers the following question; given a multiplicity of evolving 1-way conversations, can a machine or an algorithm discern the conversational pairs in an online fashio...
Michail Vlachos, Aris Anagnostopoulos, Olivier Ver...
SIGMOD
2006
ACM
125views Database» more  SIGMOD 2006»
14 years 8 months ago
Personalized privacy preservation
We study generalization for preserving privacy in publication of sensitive data. The existing methods focus on a universal approach that exerts the same amount of preservation for...
Xiaokui Xiao, Yufei Tao
FOSSACS
2009
Springer
14 years 3 months ago
On the Foundations of Quantitative Information Flow
There is growing interest in quantitative theories of information flow in a variety of contexts, such as secure information flow, anonymity protocols, and side-channel analysis. ...
Geoffrey Smith
SIGCOMM
2009
ACM
14 years 2 months ago
De-anonymizing the internet using unreliable IDs
Today’s Internet is open and anonymous. While it permits free traffic from any host, attackers that generate malicious traffic cannot typically be held accountable. In this pa...
Yinglian Xie, Fang Yu, Martín Abadi
WCNC
2008
IEEE
14 years 2 months ago
A Location Privacy Preserving Authentication Scheme in Vehicular Networks
Abstract—As an emerging application scenario of wireless technologies, vehicular communications have been initiated not only for enhancing the transportation safety and driving e...
Chenxi Zhang, Rongxing Lu, Pin-Han Ho, Anyi Chen