Sciweavers

2079 search results - page 110 / 416
» Quantifying Information Flow
Sort
View
IASTEDSEA
2004
13 years 10 months ago
Modeling and analyzing security protocols in SAM: A case study
: Secure distributed systems rely on secure information flow between different hosts, thus placing a heavy requirement on the underlying security protocols. In this paper, we use S...
Zhengfan Dai, Xudong He, Junhua Ding, Shu Gao
CORR
2008
Springer
95views Education» more  CORR 2008»
13 years 9 months ago
A Simple Algebraic Formulation for the Scalar Linear Network Coding Problem
In this work, we derive an algebraic formulation for the scalar linear network coding problem as an alternative to the one presented by Koetter et al in [1]. Using an equivalence b...
Abhay T. Subramanian, Andrew Thangaraj
ICDE
2007
IEEE
165views Database» more  ICDE 2007»
14 years 10 months ago
On Randomization, Public Information and the Curse of Dimensionality
A key method for privacy preserving data mining is that of randomization. Unlike k-anonymity, this technique does not include public information in the underlying assumptions. In ...
Charu C. Aggarwal
MIAR
2008
IEEE
14 years 3 months ago
A Surface-Based Fractal Information Dimension Method for Cortical Complexity Analysis
In this paper, we proposed a new surface-based fractal information dimension (FID) method to quantify the cortical complexity. Unlike the traditional box-counting method to measure...
Yuanchao Zhang, Jiefeng Jiang, Lei Lin, Feng Shi, ...
SACMAT
2004
ACM
14 years 2 months ago
Implementing access control to people location information
Ubiquitous computing uses a variety of information for which access needs to be controlled. For instance, a person’s current location is a sensitive piece of information, which ...
Urs Hengartner, Peter Steenkiste