Sciweavers

15379 search results - page 83 / 3076
» Protecting users from
Sort
View
IEEECIT
2006
IEEE
14 years 1 months ago
Towards Balancing Data Usefulness and Privacy Protection in K-Anonymisation
K-anonymisation, as an approach to protecting data privacy, has received much recent attention from the database research community. Given a single table, there can be many ways t...
Grigorios Loukides, Jianhua Shao
ISCAS
2006
IEEE
100views Hardware» more  ISCAS 2006»
14 years 1 months ago
Unequal authenticity protection (UAP) for rate-distortion-optimized secure streaming of multimedia over wireless networks
— This paper presents a new notion of authenticating degraded multimedia content streamed over wireless networks – Unequal Authenticity Protection (UAP). Multimedia content dif...
Zhi Li, Qibin Sun, Yong Lian
SPW
2004
Springer
14 years 1 months ago
BLIND: A Complete Identity Protection Framework for End-Points
In this paper, we present a security framework that provides identity protection against active and passive attacks for end-points. The framework is based on a two-round-trip authe...
Jukka Ylitalo, Pekka Nikander
CONEXT
2009
ACM
13 years 5 months ago
Lockr: better privacy for social networks
Today's online social networking (OSN) sites do little to protect the privacy of their users' social networking information. Given the highly sensitive nature of the inf...
Amin Tootoonchian, Stefan Saroiu, Yashar Ganjali, ...
MUE
2008
IEEE
143views Multimedia» more  MUE 2008»
14 years 2 months ago
A Robust Watermark Scheme for Copyright Protection
In this paper, we propose a robust watermark technology that can be used to protect copyright. We enhance robustness of the watermark such that it can be used to protect the intel...
Chu-Hsing Lin, Jung-Chun Liu, Chih-Hsiong Shih, Ya...