نتایج جستجو برای: ouafi phan privacy model

تعداد نتایج: 2140727  

2005
Leping Huang Hiroshi Yamane Kanta Matsuura Kaoru Sezaki

The lack of a formal model in wireless location privacy protection research makes it difficult to evaluate new location privacy protection proposals, and difficult to utilize existing research results in anonymous communication into this new problem. In this paper, we analyze a wireless location privacy protection system (WLP S), and generalize it to a MIX based formal model, which includes a M...

Hasan Alizadeh Narges Naderi

Big data has been arising a growing interest in both scien- tific and industrial fields for its potential value. However, before employing big data technology into massive appli- cations, a basic but also principle topic should be investigated: security and privacy. One of the biggest concerns of big data is privacy. However, the study on big data privacy is still at a very early stage. Many or...

Journal: :International journal of gastrointestinal intervention 2022

Tien Manh Huynh, Quang Dinh Le, Mai Ngoc Luu, Tram Thi Huyen Nguyen, Quy Nhuan Bui, Anh Phan Tuong Mai, Thang Hiep Duc Tran, Hien Minh Cong Hong Vo, and Trong Quach. Int J Gastrointest Interv 2022;11:135-8. https://doi.org/10.18528/ijgii220007

Journal: :Trans. Data Privacy 2008
Xiaoxun Sun Hua Wang Jiuyong Li Traian Marius Truta

Publishing data for analysis from a micro data table containing sensitive attributes, while maintaining individual privacy, is a problem of increasing significance today. The k-anonymity model was proposed for privacy preserving data publication. While focusing on identity disclosure, k-anonymity model fails to protect attribute disclosure to some extent. Many efforts are made to enhance the k-...

2013
Jian Shen Jin Wang Yuan Mei Ilyong Chung

Privacy is a major concern in RFID systems, especially with widespread deployment of wireless enabled interconnected personal devices. In this paper, we consider privacy issues in RFID systems where the authorized readers must be able to identify tags without an adversary being able to trace them, and provide a formal security model for privacy in RFID system. Under this model, we analyze the r...

2013
Jian Shen Wenying Zheng Jin Wang Zhihua Xia Zhangjie Fu

Privacy is a major concern in RFID systems, especially with widespread deployment of wireless enabled interconnected personal devices. In this paper, we consider privacy issues in RFID system where the authorized readers must be able to identify tags without an adversary being able to trace them, and provide a formal security model for privacy in RFID system. Under this model, we analyze the re...

Journal: :CoRR 2016
Xi He Ashwin Machanavajjhala Cheryl J. Flynn Divesh Srivastava

Many scenarios require computing the join of databases held by two or more parties that do not trust one another. Private record linkage is a cryptographic tool that allows such a join to be computed without leaking any information about records that do not participate in the join output. However, such strong security comes with a cost: except for exact equi-joins, these techniques have a high ...

2008
Keke Chen Ling Liu

The major challenge of data perturbation is to achieve the desired balance between the level of privacy guarantee and the level of data utility. Data privacy and data utility are commonly considered as a pair of conflicting requirements in privacy-preserving data mining systems and applications. Multiplicative perturbation algorithms aim at improving data privacy while maintaining the desired l...

2014
Justin Scott Giboney David W. Wilson Alexandra Durcikova

This paper develops a theoretical model to help answer the following question— what influences an individual’s opinions regarding the right to privacy of others (individuals, organizations, and governments)? This question is particularly relevant for organizations and governments, for whom insider threats to corporate or government privacy present a dangerous risk. We draw from three bases of l...

2015
Serge Vaudenay

Many wearable devices identify themselves in a pervasive way. But at the same time, people want to remain anonymous. Modeling anonymity and unlinkability in identification protocols is a delicate issue. In this paper, we revisit the privacy model from Asiacrypt 2007. We show how to achieve forward-privacy (in the V07 sense) using an IND-CCA secure cryptosystem with the PKC protocol. We review t...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید