Sciweavers

834 search results - page 13 / 167
» Quantifying and Measuring Anonymity
Sort
View
WWW
2007
ACM
14 years 11 months ago
On anonymizing query logs via token-based hashing
In this paper we study the privacy preservation properties of a specific technique for query log anonymization: tokenbased hashing. In this approach, each query is tokenized, and ...
Ravi Kumar, Jasmine Novak, Bo Pang, Andrew Tomkins
SP
2008
IEEE
117views Security Privacy» more  SP 2008»
14 years 5 months ago
Anonymous Networking with Minimum Latency in Multihop Networks
The problem of security against timing based traffic analysis in multihop networks is considered in this work. In particular, the relationship between the level of anonymity prov...
Parvathinathan Venkitasubramaniam, Lang Tong
PAM
2010
Springer
14 years 5 months ago
MOR: Monitoring and Measurements through the Onion Router
Abstract. A free and easy to use distributed monitoring and measurement platform would be valuable in several applications: monitoring network or server infrastructures, performing...
Demetres Antoniades, Evangelos P. Markatos, Consta...
SCN
2010
Springer
132views Communications» more  SCN 2010»
13 years 8 months ago
Solving Revocation with Efficient Update of Anonymous Credentials
Anonymous credential system promise efficient, ubiquitous access to digital services while preserving user privacy. However, their diffusion is impaired by the lack of efficient re...
Jan Camenisch, Markulf Kohlweiss, Claudio Soriente
IROS
2007
IEEE
143views Robotics» more  IROS 2007»
14 years 5 months ago
Metrics for quantifying system performance in intelligent, fault-tolerant multi-robot teams
— Any system that has the capability to diagnose and recover from faults is considered to be a fault-tolerant system. Additionally, the quality of the incorporated fault-toleranc...
Balajee Kannan, Lynne E. Parker