Sciweavers

54 search results - page 5 / 11
» To Do or Not To Do: The Dilemma of Disclosing Anonymized Dat...
Sort
View
PKDD
2007
Springer
112views Data Mining» more  PKDD 2007»
14 years 2 months ago
Association Mining in Large Databases: A Re-examination of Its Measures
Abstract. In the literature of data mining and statistics, numerous interestingness measures have been proposed to disclose succinct object relationships of association patterns. H...
Tianyi Wu, Yuguo Chen, Jiawei Han
RTCSA
2007
IEEE
14 years 2 months ago
A Privacy Preserving Access Control Scheme using Anonymous Identification for Ubiquitous Environments
Compared to all emerging issues, privacy is probably the most prominent concern when it comes to judging the effects of a wide spread deployment of ubiquitous computing. On one ha...
Nguyen Ngoc Diep, Sungyoung Lee, Young-Koo Lee, He...
ICC
2011
IEEE
199views Communications» more  ICC 2011»
12 years 8 months ago
Equal-Sized Cells Mean Equal-Sized Packets in Tor?
Abstract—Tor is a well-known low-latency anonymous communication system. To prevent the traffic analysis attack, Tor packs application data into equal-sized cells. However, we f...
Zhen Ling, Junzhou Luo, Wei Yu, Xinwen Fu
ICDE
2008
IEEE
219views Database» more  ICDE 2008»
14 years 10 months ago
Never Walk Alone: Uncertainty for Anonymity in Moving Objects Databases
Preserving individual privacy when publishing data is a problem that is receiving increasing attention. According to the k-anonymity principle, each release of data must be such th...
Osman Abul, Francesco Bonchi, Mirco Nanni
ISAAC
2010
Springer
276views Algorithms» more  ISAAC 2010»
13 years 6 months ago
Anonymous Fuzzy Identity-Based Encryption for Similarity Search
Abstract. In this paper, we consider the problem of predicate encryption and focus on the predicate for testing whether the hamming distance between the attribute X of a data item ...
David W. Cheung, Nikos Mamoulis, W. K. Wong, Siu-M...