Sciweavers

2259 search results - page 38 / 452
» Separation and information hiding
Sort
View
ISI
2006
Springer
13 years 7 months ago
Inferring Privacy Information from Social Networks
Since privacy information can be inferred via social relations, the privacy confidentiality problem becomes increasingly challenging as online social network services are more popu...
Jianming He, Wesley W. Chu, Zhenyu Liu
BIRTHDAY
2004
Springer
14 years 1 months ago
Composing Hidden Information Modules over Inclusive Institutions
: This paper studies the composition of modules that can hide information, over a very general class of logical systems called inclusive institutions. Two semantics are given for c...
Joseph A. Goguen, Grigore Rosu
GI
2001
Springer
14 years 3 days ago
Private Information Retrieval
In e-commerce, the protection of user privacy from a server was not considered feasible until the private information retrieval (PIR) problem was stated recently. A PIR protocol a...
Dmitri Asonov
ACSAC
2006
IEEE
13 years 11 months ago
CryptoPage: An Efficient Secure Architecture with Memory Encryption, Integrity and Information Leakage Protection
Several secure computing hardware architectures using memory encryption and memory integrity checkers have been proposed during the past few years to provide applications with a t...
Guillaume Duc, Ronan Keryell
ICDE
2006
IEEE
176views Database» more  ICDE 2006»
14 years 1 months ago
Deriving Private Information from Perturbed Data Using IQR Based Approach
Several randomized techniques have been proposed for privacy preserving data mining of continuous data. These approaches generally attempt to hide the sensitive data by randomly m...
Songtao Guo, Xintao Wu, Yingjiu Li