Sciweavers

834 search results - page 10 / 167
» Quantifying and Measuring Anonymity
Sort
View
HICSS
2009
IEEE
100views Biometrics» more  HICSS 2009»
14 years 5 months ago
Quantifying IT Value Latency: The Case of the Financial Services Industry
Both the academia and practice recognize that information technology (IT) investments may not yield immediate benefits. Nevertheless, there has been a lack of methodological devel...
Kim Huat Goh, Robert J. Kauffman
EXPCS
2007
14 years 2 months ago
Quantifying the cost of context switch
Measuring the indirect cost of context switch is a challenging problem. In this paper, we show our results of experimentally quantifying the indirect cost of context switch using ...
Chuanpeng Li, Chen Ding, Kai Shen
DCC
2010
IEEE
13 years 11 months ago
Anonymity in shared symmetric key primitives
We provide a stronger definition of anonymity in the context of shared symmetric key primitives, and show that existing schemes do not provide this level of anonymity. A new schem...
Gregory M. Zaverucha, Douglas R. Stinson
CCR
2006
116views more  CCR 2006»
13 years 11 months ago
The devil and packet trace anonymization
Releasing network measurement data--including packet traces-to the research community is a virtuous activity that promotes solid research. However, in practice, releasing anonymiz...
Ruoming Pang, Mark Allman, Vern Paxson, Jason Lee
DSN
2009
IEEE
14 years 5 months ago
On the effectiveness of low latency anonymous network in the presence of timing attack
In this paper, we introduce a novel metric that can quantitatively measure the practical effectiveness (i.e. anonymity) of all anonymous networks in the presence of timing attack....
Jing Jin, Xinyuan Wang