Sciweavers

661 search results - page 10 / 133
» Robustness Guarantees for Anonymity
Sort
View
MAGS
2006
79views more  MAGS 2006»
13 years 7 months ago
Utilizing node's selfishness for providing complete anonymity in peer-to-peer based grids
In this paper, a novel protocol for providing both client and server anonymity in peer-to-peer (P2P) based grids is presented. The protocol assumes individual nodes or users to be...
Rohit Gupta, Souvik Ray, Arun K. Somani, Zhao Zhan...
PVLDB
2008
116views more  PVLDB 2008»
13 years 6 months ago
Anonymizing bipartite graph data using safe groupings
Private data often comes in the form of associations between entities, such as customers and products bought from a pharmacy, which are naturally represented in the form of a larg...
Graham Cormode, Divesh Srivastava, Ting Yu, Qing Z...
TDSC
2011
13 years 2 months ago
CASTLE: Continuously Anonymizing Data Streams
— Most of existing privacy preserving techniques, such as k-anonymity methods, are designed for static data sets. As such, they cannot be applied to streaming data which are cont...
Jianneng Cao, Barbara Carminati, Elena Ferrari, Ki...
ESORICS
2009
Springer
14 years 2 months ago
Private Information Retrieval Techniques for Enabling Location Privacy in Location-Based Services
Abstract. The ubiquity of smartphones and other location-aware handheld devices has resulted in a dramatic increase in popularity of locationbased services (LBS) tailored to user l...
Ali Khoshgozaran, Cyrus Shahabi
AAIM
2007
Springer
142views Algorithms» more  AAIM 2007»
13 years 11 months ago
Design of a Fuzzy PI Controller to Guarantee Proportional Delay Differentiation on Web Servers
PI controller has attracted researchers in industrial control processes because of its simplicity and robust performance in a wide range of operating conditions. It has been used t...
Ka Ho Chan, Xiaowen Chu