Sciweavers

1351 search results - page 109 / 271
» Trust in Anonymity Networks
Sort
View
WICOMM
2010
81views more  WICOMM 2010»
13 years 4 months ago
Trusted cognitive radio networking
Kwang-Cheng Chen, Peng-Yu Chen, Neeli Rashmi Prasa...
JAMIA
2011
140views more  JAMIA 2011»
13 years 28 days ago
Never too old for anonymity: a statistical standard for demographic data sharing via the HIPAA Privacy Rule
Objective Healthcare organizations must de-identify patient records before sharing data. Many organizations rely on the Safe Harbor Standard of the HIPAAPrivacy Rule, which enumer...
Bradley Malin, Kathleen Benitez, Daniel R. Masys
SAC
2010
ACM
14 years 4 months ago
Trustworthy interaction balancing in mixed service-oriented systems
Web-based collaboration systems typically require dynamic and context-based interactions between people and services. To support such complex interaction scenarios, we introduce a...
Florian Skopik, Daniel Schall, Schahram Dustdar
SP
2006
IEEE
14 years 4 months ago
Locating Hidden Servers
Hidden services were deployed on the Tor anonymous communication network in 2004. Announced properties include server resistance to distributed DoS. Both the EFF and Reporters Wit...
Lasse Øverlier, Paul F. Syverson