Sciweavers

834 search results - page 13 / 167
» Quantifying and Measuring Anonymity
Sort
View
108
Voted
WWW
2007
ACM
16 years 4 months ago
On anonymizing query logs via token-based hashing
In this paper we study the privacy preservation properties of a specific technique for query log anonymization: tokenbased hashing. In this approach, each query is tokenized, and ...
Ravi Kumar, Jasmine Novak, Bo Pang, Andrew Tomkins
143
Voted
SP
2008
IEEE
117views Security Privacy» more  SP 2008»
15 years 10 months ago
Anonymous Networking with Minimum Latency in Multihop Networks
The problem of security against timing based traffic analysis in multihop networks is considered in this work. In particular, the relationship between the level of anonymity prov...
Parvathinathan Venkitasubramaniam, Lang Tong
217
Voted
PAM
2010
Springer
15 years 10 months ago
MOR: Monitoring and Measurements through the Onion Router
Abstract. A free and easy to use distributed monitoring and measurement platform would be valuable in several applications: monitoring network or server infrastructures, performing...
Demetres Antoniades, Evangelos P. Markatos, Consta...
146
Voted
SCN
2010
Springer
132views Communications» more  SCN 2010»
15 years 1 months ago
Solving Revocation with Efficient Update of Anonymous Credentials
Anonymous credential system promise efficient, ubiquitous access to digital services while preserving user privacy. However, their diffusion is impaired by the lack of efficient re...
Jan Camenisch, Markulf Kohlweiss, Claudio Soriente
130
Voted
IROS
2007
IEEE
143views Robotics» more  IROS 2007»
15 years 10 months ago
Metrics for quantifying system performance in intelligent, fault-tolerant multi-robot teams
— Any system that has the capability to diagnose and recover from faults is considered to be a fault-tolerant system. Additionally, the quality of the incorporated fault-toleranc...
Balajee Kannan, Lynne E. Parker