Sciweavers

796 search results - page 16 / 160
» The Anonymous Subgraph Problem
Sort
View
ICDE
2008
IEEE
178views Database» more  ICDE 2008»
14 years 8 months ago
On the Optimal Selection of k in the k-Anonymity Problem
When disseminating data involving human subjects, researchers have to weigh in the requirements of privacy of the individuals involved in the data. A model widely used for enhancin...
Rinku Dewri, Indrajit Ray, Indrakshi Ray, Darrell ...
ICDM
2008
IEEE
123views Data Mining» more  ICDM 2008»
14 years 1 months ago
Mining Periodic Behavior in Dynamic Social Networks
Social interactions that occur regularly typically correspond to significant yet often infrequent and hard to detect interaction patterns. To identify such regular behavior, we p...
Mayank Lahiri, Tanya Y. Berger-Wolf
ICICS
2009
Springer
14 years 1 months ago
Biometric-Based Non-transferable Anonymous Credentials
This work explores the problem of using biometric data to achieve non-transferability of anonymous credentials; that is, sharing of anonymous credentials, which allow one to anonym...
Marina Blanton, William M. P. Hudelson
CARDIS
2004
Springer
126views Hardware» more  CARDIS 2004»
14 years 24 days ago
Anonymous Services using Smart Cards and Cryptography
More and more services provided by Internet pose a problem of privacy and anonymity. One cryptographic tool that could be used for solving this problem is the group signature [1, 5...
Sébastien Canard, Jacques Traoré