Sciweavers

19003 search results - page 179 / 3801
» We Need Assurance!
Sort
View
ADC
2010
Springer
204views Database» more  ADC 2010»
13 years 5 months ago
Systematic clustering method for l-diversity model
Nowadays privacy becomes a major concern and many research efforts have been dedicated to the development of privacy protecting technology. Anonymization techniques provide an eff...
Md. Enamul Kabir, Hua Wang, Elisa Bertino, Yunxian...
SOCIALCOM
2010
13 years 5 months ago
A Multi-factor Approach to Securing Software on Client Computing Platforms
Protecting the integrity of software platforms, especially in unmanaged consumer computing systems is a difficult problem. Attackers may attempt to execute buffer overflow attacks ...
Raghunathan Srinivasan, Vivek Iyer, Amit Kanitkar,...
TDP
2010
189views more  TDP 2010»
13 years 5 months ago
The PROBE Framework for the Personalized Cloaking of Private Locations
The widespread adoption of location-based services (LBS) raises increasing concerns for the protection of personal location information. A common strategy, referred to as obfuscati...
Maria Luisa Damiani, Elisa Bertino, Claudio Silves...
ICASSP
2011
IEEE
13 years 2 months ago
Filter design with secrecy constraints: The multiple-input multiple-output Gaussian wiretap channel with zero forcing receive fi
This paper considers the problem of lter design with secrecy constraints, where two legitimate parties (Alice and Bob) communicate in the presence of an eavesdropper (Eve), over a...
Hugo Reboredo, Vinay Uday Prabhu, Miguel R. D. Rod...
DAC
2011
ACM
12 years 10 months ago
ChronOS Linux: a best-effort real-time multiprocessor Linux kernel
We present ChronOS Linux, a best-effort real-time Linux kernel for chip multiprocessors (CMPs). ChronOS addresses the intersection of three problem spaces: a) OS-support for obta...
Matthew Dellinger, Piyush Garyali, Binoy Ravindran