Sciweavers

1599 search results - page 31 / 320
» Probabilistic Analysis of Anonymity
Sort
View
CIVR
2010
Springer
134views Image Analysis» more  CIVR 2010»
14 years 3 months ago
Scale-invariant proximity graph for fast probabilistic object recognition
Jérome Revaud, Guillaume Lavoué, Yas...
KDD
2009
ACM
296views Data Mining» more  KDD 2009»
14 years 10 months ago
Anonymizing healthcare data: a case study on the blood transfusion service
: Gaining access to high-quality health data is a vital requirement to informed decision making for medical practitioners and pharmaceutical researchers. Driven by mutual benefits ...
Noman Mohammed, Benjamin C. M. Fung, Patrick C. K....
P2P
2003
IEEE
157views Communications» more  P2P 2003»
14 years 3 months ago
TrustMe: Anonymous Management of Trust Relationships in Decentralized P2P Systems
Decentralized Peer to Peer (P2P) networks offer both opportunities and threats. Its open and decentralized nature makes it extremely susceptible to malicious users spreading harmf...
Aameek Singh, Ling Liu
CORR
2007
Springer
124views Education» more  CORR 2007»
13 years 10 months ago
Anonymous Networking amidst Eavesdroppers
—The problem of security against packet timing based traffic analysis in wireless networks is considered in this work. An analytical measure of “anonymity” of routes in eave...
Parvathinathan Venkitasubramaniam, Ting He, Lang T...
GLOBECOM
2007
IEEE
14 years 4 months ago
Dynamic Multipath Onion Routing in Anonymous Peer-To-Peer Overlay Networks
— Although recent years provided many protocols for anonymous routing in overlay networks, they commonly rely on the same communication paradigm: Onion Routing. In Onion Routing ...
Olaf Landsiedel, Lexi Pimenidis, Klaus Wehrle, Hei...