Sciweavers

834 search results - page 31 / 167
» Quantifying and Measuring Anonymity
Sort
View
ICASSP
2011
IEEE
13 years 2 months ago
Multichannel EEG analysis based on multi-scale multi-information
Functional connectivity has been widely used to reveal the dependencies between signals in complex networks such as neural networks observed from electroencephalogram (EEG) data. ...
Ying Liu, Selin Aviyente
PET
2010
Springer
14 years 2 months ago
Anonymous Webs of Trust
Abstract. Webs of trust constitute a decentralized infrastructure for establishing the authenticity of the binding between public keys and users and, more generally, trust relation...
Michael Backes, Stefan Lorenz, Matteo Maffei, Kim ...
ICDM
2006
IEEE
127views Data Mining» more  ICDM 2006»
14 years 5 months ago
Optimal k-Anonymity with Flexible Generalization Schemes through Bottom-up Searching
In recent years, a major thread of research on kanonymity has focused on developing more flexible generalization schemes that produce higher-quality datasets. In this paper we in...
Tiancheng Li, Ninghui Li
VLDB
2005
ACM
114views Database» more  VLDB 2005»
14 years 4 months ago
Checking for k-Anonymity Violation by Views
When a private relational table is published using views, secrecy or privacy may be violated. This paper uses a formally-defined notion of k-anonymity to measure disclosure by vi...
Chao Yao, Xiaoyang Sean Wang, Sushil Jajodia
ICDE
2008
IEEE
219views Database» more  ICDE 2008»
15 years 9 days ago
Never Walk Alone: Uncertainty for Anonymity in Moving Objects Databases
Preserving individual privacy when publishing data is a problem that is receiving increasing attention. According to the k-anonymity principle, each release of data must be such th...
Osman Abul, Francesco Bonchi, Mirco Nanni