Sciweavers

661 search results - page 14 / 133
» Robustness Guarantees for Anonymity
Sort
View
PKC
2012
Springer
235views Cryptology» more  PKC 2012»
11 years 9 months ago
Outsider-Anonymous Broadcast Encryption with Sublinear Ciphertexts
Abstract. In the standard setting of broadcast encryption, information about the receivers is transmitted as part of the ciphertext. In several broadcast scenarios, however, the id...
Nelly Fazio, Irippuge Milinda Perera
SIGMOD
2006
ACM
96views Database» more  SIGMOD 2006»
14 years 7 months ago
Injecting utility into anonymized datasets
Limiting disclosure in data publishing requires a careful balance between privacy and utility. Information about individuals must not be revealed, but a dataset should still be us...
Daniel Kifer, Johannes Gehrke
SSD
2007
Springer
155views Database» more  SSD 2007»
14 years 1 months ago
MobiHide: A Mobilea Peer-to-Peer System for Anonymous Location-Based Queries
Abstract. Modern mobile phones and PDAs are equipped with positioning capabilities (e.g., GPS). Users can access public location-based services (e.g., Google Maps) and ask spatial ...
Gabriel Ghinita, Panos Kalnis, Spiros Skiadopoulos
ICDE
2008
IEEE
177views Database» more  ICDE 2008»
14 years 8 months ago
On Anti-Corruption Privacy Preserving Publication
This paper deals with a new type of privacy threat, called "corruption", in anonymized data publication. Specifically, an adversary is said to have corrupted some individ...
Yufei Tao, Xiaokui Xiao, Jiexing Li, Donghui Zhang
ISCAS
2005
IEEE
161views Hardware» more  ISCAS 2005»
14 years 29 days ago
LMI-based neurocontroller for guaranteed cost control of uncertain time-delay systems
— This paper considers the application of the neural networks for the guaranteed cost control problem of discrete– time uncertain systems that have in both state and input dela...
Hiroaki Mukaidani, S. Sakaguchi, Toshio Tsuji