Sciweavers

661 search results - page 18 / 133
» Robustness Guarantees for Anonymity
Sort
View
INFSOF
2006
81views more  INFSOF 2006»
13 years 7 months ago
A framework for anonymous but accountable self-organizing communities
In this paper we propose a novel architecture and approach to provide accountability for Web communities that require a high-level of privacy. A two-layered privacy protection arc...
Gábor Ziegler, Csilla Farkas, András...
IEEEARES
2008
IEEE
14 years 1 months ago
A Post-processing Method to Lessen k-Anonymity Dissimilarities
Protecting personal data is essential to guarantee the rule of law1 . Due to the new Information and Communication Technologies (ICTs) unprecedented amounts of personal data can b...
Agusti Solanas, Gloria Pujol, Antoni Martín...
DAWAK
2006
Springer
13 years 11 months ago
Priority-Based k-Anonymity Accomplished by Weighted Generalisation Structures
Abstract. Biobanks are gaining in importance by storing large collections of patient's clinical data (e.g. disease history, laboratory parameters, diagnosis, life style) toget...
Konrad Stark, Johann Eder, Kurt Zatloukal
IROS
2009
IEEE
149views Robotics» more  IROS 2009»
14 years 2 months ago
Mutual localization in a multi-robot system with anonymous relative position measures
— We address the mutual localization problem for a multi-robot system, under the assumption that each robot is equipped with a sensor that provides a measure of the relative posi...
Antonio Franchi, Giuseppe Oriolo, Paolo Stegagno
INFOCOM
2007
IEEE
14 years 1 months ago
Mutual Anonymous Communications: A New Covert Channel Based on Splitting Tree MAC
—Known covert channel based on splitting algorithms in Medium Access Control (MAC) protocols requires the receiver’s knowledge of the sender’s identity. In this paper we pres...
Zhenghong Wang, Jing Deng, Ruby B. Lee