Sciweavers

834 search results - page 17 / 167
» Quantifying and Measuring Anonymity
Sort
View
CORR
2008
Springer
85views Education» more  CORR 2008»
13 years 11 months ago
Quantifying Timing Leaks and Cost Optimisation
We develop a new notion of security against timing attacks where the attacker is able to simultaneously observe the execution time of a program and the probability of the values of...
Alessandra Di Pierro, Chris Hankin, Herbert Wiklic...
IJNSEC
2007
144views more  IJNSEC 2007»
13 years 10 months ago
IPLess Stochastic Anonymous Routing Algorithm Using Multi-Agent Systems
The ability of communicating with a selected party anonymously is an important aspect of network security. Communicating anonymously means that no adversary can discern who is com...
Magdy Saeb, Meer Hamza, Ahmed El-Shikh
DAWAK
2006
Springer
14 years 2 months ago
Priority-Based k-Anonymity Accomplished by Weighted Generalisation Structures
Abstract. Biobanks are gaining in importance by storing large collections of patient's clinical data (e.g. disease history, laboratory parameters, diagnosis, life style) toget...
Konrad Stark, Johann Eder, Kurt Zatloukal
ICDE
2006
IEEE
176views Database» more  ICDE 2006»
15 years 8 days ago
Mondrian Multidimensional K-Anonymity
K-Anonymity has been proposed as a mechanism for protecting privacy in microdata publishing, and numerous recoding "models" have been considered for achieving kanonymity...
Kristen LeFevre, David J. DeWitt, Raghu Ramakrishn...
MICCAI
2003
Springer
14 years 11 months ago
Quantifying Evolving Processes in Multimodal 3D Medical Images
Quantitative measurements of changes in evolving brain pathology, such as multiple sclerosis lesions and brain tumors, are important for clinicians to perform pertinent diagnoses a...
Yuhang Wang, Tilmann Steinberg, Fillia Makedon, Ja...