• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 2,525
Next 10 →

Calibrating noise to sensitivity in private data analysis

by Cynthia Dwork, Frank Mcsherry, Kobbi Nissim, Adam Smith - In Proceedings of the 3rd Theory of Cryptography Conference , 2006
"... Abstract. We continue a line of research initiated in [10, 11] on privacypreserving statistical databases. Consider a trusted server that holds a database of sensitive information. Given a query function f mapping databases to reals, the so-called true answer is the result of applying f to the datab ..."
Abstract - Cited by 649 (60 self) - Add to MetaCart
argument to f can change its output. The new analysis shows that for several particular applications substantially less noise is needed than was previously understood to be the case. The first step is a very clean characterization of privacy in terms of indistinguishability of transcripts. Additionally, we

Generalized privacy amplification

by Charles H. Bennett, Gilles Brassard, Claude Crkpeau, Ueli M. Maurer, Senior Member - IEEE Transactions on Information Theory , 1995
"... Abstract- This paper provides a general treatment of pri-vacy amplification by public discussion, a concept introduced by Bennett, Brassard, and Robert for a special scenario. Privacy amplification is a process that allows two parties to distill a secret key from a common random variable about which ..."
Abstract - Cited by 325 (19 self) - Add to MetaCart
results on wiretap and broadcast channels for a considerably strengthened definition of secrecy capacity. Index Terms- Cryptography, secret-key agreement, uncondi-tional security, privacy amplification, wiretap channel, secrecy capacity, RCnyi entropy, universal hashing, quantum cryptogra-phy. I.

RFID security and privacy: A research survey

by Ari Juels - ISBN 978-89-5519-136-3 -88- Feb. 17-20, 2008 ICACT 2008 , 2006
"... Abstract—This paper surveys recent technical research on the problems of privacy and security for radio frequency identification (RFID). RFID tags are small, wireless devices that help identify objects and people. Thanks to dropping cost, they are likely to proliferate into the billions in the next ..."
Abstract - Cited by 353 (6 self) - Add to MetaCart
, and treats the social and technical context of their work. While geared toward the nonspecialist, the survey may also serve as a reference for specialist readers. Index Terms—Authentication, cloning, counterfeiting, electronic product code (EPC), privacy, radio frequency identification (RFID), security. I.

Protecting Privacy when Disclosing Information: k-Anonymity and Its Enforcement through Generalization and Suppression

by Pierangela Samarati, Latanya Sweeney , 1998
"... Today's globally networked society places great demand on the dissemination and sharing of person-specific data. Situations where aggregate statistical information was once the reporting norm now rely heavily on the transfer of microscopically detailed transaction and encounter information. Thi ..."
Abstract - Cited by 315 (1 self) - Add to MetaCart
no explicit identifiers, such as name and phone number. In order to protect the anonymity of individuals to whom released data refer, data holders often remove or encrypt explicit identifiers such as names, addresses and phone numbers. However, other distinctive data, which we term quasi-identifiers, often

Anonymous connections and onion routing

by Michael G. Reed, Paul F. Syverson, David M. Goldschlag - IEEE Journal on Selected Areas in Communications , 1998
"... Abstract—Onion routing is an infrastructure for private communication over a public network. It provides anonymous connections that are strongly resistant to both eavesdropping and traffic analysis. Onion routing’s anonymous connections are bidirectional, near real-time, and can be used anywhere a s ..."
Abstract - Cited by 368 (18 self) - Add to MetaCart
network is running between our lab and other sites. This paper describes anonymous connections and their implementation using onion routing. This paper also describes several application proxies for onion routing, as well as configurations of onion routing networks. Index Terms—Anonymity, communications

An architecture for privacy-sensitive ubiquitous computing

by Jason I. Hong - In MobiSYS ’04: Proceedings of the 2nd international conference on mobile systems, applications, and services , 2004
"... Privacy is the most often-cited criticism of ubiquitous computing, and may be the greatest barrier to its long-term success. However, developers currently have little support in designing software architectures and in creating interactions that are effective in helping end-users manage their privacy ..."
Abstract - Cited by 231 (16 self) - Add to MetaCart
Privacy is the most often-cited criticism of ubiquitous computing, and may be the greatest barrier to its long-term success. However, developers currently have little support in designing software architectures and in creating interactions that are effective in helping end-users manage

Privacy

by unknown authors
"... Today’s enterprise applications are complex, business-critical software systems. An important extra-functional characteristic of these systems is performance, consisting of timing behavior and resource utilization. Especially performance requirements on timing behavior metrics such as throughput or ..."
Abstract - Add to MetaCart
interactive software systems which are accessible through the Internet are exposed to highly varying workloads, e.g., in terms of the number of concurrent users. The timing behavior of such systems is significantly influenced by the workload conditions. Over the last years, capacity management was performed

Engineering privacy

by Sarah Spiekermann, Lorrie Faith Cranor, Senior Member - IEEE Transactions on Software Engineering , 2009
"... Abstract—In this paper, we integrate insights from diverse islands of research on electronic privacy to offer a holistic view of privacy engineering and a systematic structure for the discipline’s topics. First, we discuss privacy requirements grounded in both historic and contemporary perspectives ..."
Abstract - Cited by 92 (4 self) - Add to MetaCart
privacy-friendly systems. Index Terms—Privacy, security, privacy-enhancing technologies, anonymity, identification. Ç 1

Security and Privacy Requirements Analysis within a Social Setting

by Lin Liu, Eric Yu, John Mylopoulos - In Proc. of RE’03 , 2003
"... Security issues for software systems ultimately concern relationships among social actors-stakeholders, system users, potential attackers- and the software acting on their behalf. This paper proposes a methodological framework for dealing with security and privacy requirements based on i*, an agent- ..."
Abstract - Cited by 139 (19 self) - Add to MetaCart
Security issues for software systems ultimately concern relationships among social actors-stakeholders, system users, potential attackers- and the software acting on their behalf. This paper proposes a methodological framework for dealing with security and privacy requirements based on i*, an agent

Characterizing Privacy in Online Social Networks

by Balachander Krishnamurthy, Craig E. Wills
"... Online social networks (OSNs) with half a billion users have dramatically raised concerns on privacy leakage. Users, often willingly, share personal identifying information about themselves, but do not have a clear idea of who accesses their private information or what portion of it really needs to ..."
Abstract - Cited by 94 (8 self) - Add to MetaCart
users and compare with privacy leakage on popular traditional Web sites. Our long term goal is to identify the narrow set of private information that users really need to share to accomplish specific interactions on OSNs.
Next 10 →
Results 1 - 10 of 2,525
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University