Sciweavers

382 search results - page 31 / 77
» k-Anonymity: A Model for Protecting Privacy
Sort
View
ACNS
2010
Springer
200views Cryptology» more  ACNS 2010»
14 years 3 months ago
Deniable Internet Key Exchange
In this work, we develop a family of protocols for deniable Internet Key-Exchange (IKE) with the following properties: • Highly practical efficiency, and conceptual simplicity a...
Andrew Chi-Chih Yao, Yunlei Zhao
SIGMOD
2010
ACM
243views Database» more  SIGMOD 2010»
13 years 10 months ago
Non-homogeneous generalization in privacy preserving data publishing
Most previous research on privacy-preserving data publishing, based on the k-anonymity model, has followed the simplistic approach of homogeneously giving the same generalized val...
Wai Kit Wong, Nikos Mamoulis, David Wai-Lok Cheung
EDBT
2012
ACM
225views Database» more  EDBT 2012»
12 years 24 days ago
Differentially private search log sanitization with optimal output utility
Web search logs contain extremely sensitive data, as evidenced by the recent AOL incident. However, storing and analyzing search logs can be very useful for many purposes (i.e. in...
Yuan Hong, Jaideep Vaidya, Haibing Lu, Mingrui Wu
ICDCS
2005
IEEE
14 years 4 months ago
Enhancing Source-Location Privacy in Sensor Network Routing
— One of the most notable challenges threatening the successful deployment of sensor systems is privacy. Although many privacy-related issues can be addressed by security mechani...
Pandurang Kamat, Yanyong Zhang, Wade Trappe, Celal...
IFIP11
2004
110views Business» more  IFIP11 2004»
13 years 11 months ago
A Security Model for Anonymous Credential Systems
This paper proposes a formal model of the Bellare-Rogaway type [1] that enables one to prove the security of an anonymous credential system in a complexity theoretic framework. Th...
Andreas Pashalidis, Chris J. Mitchell