Sciweavers

1128 search results - page 19 / 226
» Structuring anonymity metrics
Sort
View
ICDM
2006
IEEE
124views Data Mining» more  ICDM 2006»
14 years 1 months ago
Finding "Who Is Talking to Whom" in VoIP Networks via Progressive Stream Clustering
Technologies that use the Internet network to deliver voice communications have the potential to reduce costs and improve access to communications services around the world. Howev...
Olivier Verscheure, Michail Vlachos, Aris Anagnost...
DCC
2010
IEEE
13 years 7 months ago
Anonymity in shared symmetric key primitives
We provide a stronger definition of anonymity in the context of shared symmetric key primitives, and show that existing schemes do not provide this level of anonymity. A new schem...
Gregory M. Zaverucha, Douglas R. Stinson
CCS
2009
ACM
13 years 11 months ago
The bayesian traffic analysis of mix networks
This work casts the traffic analysis of anonymity systems, and in particular mix networks, in the context of Bayesian inference. A generative probabilistic model of mix network ar...
Carmela Troncoso, George Danezis
APSCC
2008
IEEE
13 years 9 months ago
Measuring the Effectiveness and the Fairness of Relation Hiding Systems
In this paper, we develop a framework for measuring the level of protection offered by relation hiding systems. The framework provides a uniform way to define a variety of privacy ...
Andreas Pashalidis
SIGMOD
2010
ACM
274views Database» more  SIGMOD 2010»
14 years 13 days ago
K-isomorphism: privacy preserving network publication against structural attacks
Serious concerns on privacy protection in social networks have been raised in recent years; however, research in this area is still in its infancy. The problem is challenging due ...
James Cheng, Ada Wai-Chee Fu, Jia Liu