Sciweavers

2272 search results - page 20 / 455
» Provable Data Privacy
Sort
View
IFIP
2010
Springer
13 years 2 months ago
Modeling Identity-Related Properties and Their Privacy Strength
In the last years several attempts to define identity-related properties such as identifiability, pseudonymity and anonymity have been made to analyze the privacy offered by inform...
Meilof Veeningen, Benne de Weger, Nicola Zannone
IEEEARES
2008
IEEE
14 years 2 months ago
Privacy-Preserving Distributed Set Intersection
With the growing demand of databases outsourcing and its security concerns, we investigate privacy-preserving set intersection in a distributed scenario. We propose a one-round pr...
Qingsong Ye, Huaxiong Wang, Christophe Tartary
FC
2006
Springer
97views Cryptology» more  FC 2006»
13 years 11 months ago
Privacy-Protecting Coupon System Revisited
Abstract. At FC'05, Chen et al. introduced an elegant privacy protecting coupon (PPC) system, CESSS05 [13], in which users can purchase multi-coupons and redeem them unlinkabl...
Lan Nguyen
ACISP
2003
Springer
14 years 1 months ago
On the Pseudorandomness of KASUMI Type Permutations
KASUMI is a block cipher which has been adopted as a standard of 3GPP. In this paper, we study the pseudorandomness of idealized KASUMI type permutations for adaptive adversaries. ...
Tetsu Iwata, Tohru Yagi, Kaoru Kurosawa
IEEEARES
2007
IEEE
14 years 2 months ago
Using Privacy Process Patterns for Incorporating Privacy Requirements into the System Design Process
In the online world every person has to hold a number of different data sets so as to be able to have access to various e-services and take part in specific economical and social ...
Christos Kalloniatis, Evangelia Kavakli, Stefanos ...