Sciweavers

3452 search results - page 118 / 691
» Secure Data Outsourcing
Sort
View
PSD
2004
Springer
94views Database» more  PSD 2004»
14 years 3 months ago
On the Security of Noise Addition for Privacy in Statistical Databases
Noise addition is a family of methods used in the protection of the privacy of individual data (microdata) in statistical databases. This paper is a critical analysis of the securi...
Josep Domingo-Ferrer, Francesc Sebé, Jordi ...
JCS
2000
148views more  JCS 2000»
13 years 9 months ago
Using Sample Size to Limit Exposure to Data Mining
Data mining introduces new problems in database security. The basic problem of using non-sensitive data to infer sensitive data is made more difficult by the "prob abilistic&...
Chris Clifton
IJNSEC
2008
164views more  IJNSEC 2008»
13 years 10 months ago
Secure Real-Time Streaming Protocol (RTSP) for Hierarchical Proxy Caching
Proxies are commonly used to cache objects, especially multimedia objects, so that clients can enjoy better quality-of-service (QoS) guarantees such as smaller startup latency and...
Yeung Siu Fung, John C. S. Lui, David K. Y. Yau
MVA
1998
117views Computer Vision» more  MVA 1998»
13 years 9 months ago
A system for a new two-dimensional code: Secure 2D code
Abstract. A new 2D code called Secure 2D code is designed in this paper, both encoder and decoder are also proposed. Secure 2D code can store any kind of data and provides high sec...
Chung-Tsai Yeh, Ling-Hwei Chen
WINET
2002
101views more  WINET 2002»
13 years 9 months ago
SPINS: Security Protocols for Sensor Networks
As sensor networks edge closer towards wide-spread deployment, security issues become a central concern. So far, much research has focused on making sensor networks feasible and u...
Adrian Perrig, Robert Szewczyk, J. D. Tygar, Victo...