Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

17 results
Keywords : anonymity
Image document

Anonygator: Privacy and Integrity Preserving Data Aggregation

Krishna P. N. Puttaswamy , Ranjita Bhagwan , Venkata N. Padmanabhan
ACM/IFIP/USENIX 11th International Middleware Conference (MIDDLEWARE), Nov 2010, Bangalore, India. pp.85-106, ⟨10.1007/978-3-642-16955-7_5⟩
Conference papers hal-01055270v1
Image document

Open Research Questions of Privacy-Enhanced Event Scheduling

Benjamin Kellermann
1st Open Research Problems in Network Security (iNetSec), Mar 2010, Sofia, Bulgaria. pp.9-19, ⟨10.1007/978-3-642-19228-9_2⟩
Conference papers hal-01581331v1
Image document

Generic Constructions of Biometric Identity Based Encryption Systems

Neyire Deniz Sarier
4th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices (WISTP), Apr 2010, Passau, Germany. pp.90-105, ⟨10.1007/978-3-642-12368-9_7⟩
Conference papers hal-01056064v1
Image document

Secure Obfuscation of Authoring Style

Hoi Le , Reihaneh Safavi-Naini , Asadullah Galib
9th Workshop on Information Security Theory and Practice (WISTP), Aug 2015, Heraklion, Crete, Greece. pp.88-103, ⟨10.1007/978-3-319-24018-3_6⟩
Conference papers hal-01442555v1
Image document

Privacy Consensus in Anonymization Systems via Game Theory

Rosa Karimi Adl , Mina Askari , Ken Barker , Reihaneh Safavi-Naini
26th Conference on Data and Applications Security and Privacy (DBSec), Jul 2012, Paris, France. pp.74-89, ⟨10.1007/978-3-642-31540-4_6⟩
Conference papers hal-01534775v1
Image document

Practical Revocable Anonymous Credentials

Jan Hajny , Lukas Malina
13th International Conference on Communications and Multimedia Security (CMS), Sep 2012, Canterbury, United Kingdom. pp.211-213, ⟨10.1007/978-3-642-32805-3_22⟩
Conference papers hal-01540883v1
Image document

Secure Password-Based Remote User Authentication Scheme with Non-tamper Resistant Smart Cards

Ding Wang , Chun-Guang Ma , Peng Wu
26th Conference on Data and Applications Security and Privacy (DBSec), Jul 2012, Paris, France. pp.114-121, ⟨10.1007/978-3-642-31540-4_9⟩
Conference papers hal-01534767v1
Image document

Not a Free Lunch, But a Cheap One: On Classifiers Performance on Anonymized Datasets

Mina Alishahi , Nicola Zannone
35th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2021, Calgary, AB, Canada. pp.237-258, ⟨10.1007/978-3-030-81242-3_14⟩
Conference papers hal-03677025v1
Image document

Modified Efficient and Secure Dynamic ID-Based User Authentication Scheme

Toan-Thinh Truong , Minh-Triet Tran , Anh-Duc Duong
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.409-415, ⟨10.1007/978-3-642-36818-9_45⟩
Conference papers hal-01480254v1
Image document

DO NOT DISTURB? Classifier Behavior on Perturbed Datasets

Bernd Malle , Peter Kieseberg , Andreas Holzinger
1st International Cross-Domain Conference for Machine Learning and Knowledge Extraction (CD-MAKE), Aug 2017, Reggio, Italy. pp.155-173, ⟨10.1007/978-3-319-66808-6_11⟩
Conference papers hal-01677128v1
Image document

The Right to Be Forgotten: Towards Machine Learning on Perturbed Knowledge Bases

Bernd Malle , Peter Kieseberg , Edgar Weippl , Andreas Holzinger
International Conference on Availability, Reliability, and Security (CD-ARES), Aug 2016, Salzburg, Austria. pp.251-266, ⟨10.1007/978-3-319-45507-5_17⟩
Conference papers hal-01635002v1
Image document

Anonymous Lattice-Based Broadcast Encryption

Adela Georgescu
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.353-362, ⟨10.1007/978-3-642-36818-9_39⟩
Conference papers hal-01480192v1
Image document

Distributed Data Federation without Disclosure of User Existence

Takao Takenouchi , Takahiro Kawamura , Akihiko Ohsuga
26th Conference on Data and Applications Security and Privacy (DBSec), Jul 2012, Paris, France. pp.282-297, ⟨10.1007/978-3-642-31540-4_22⟩
Conference papers hal-01534759v1
Image document

Achieving Anonymity against Major Face Recognition Algorithms

Benedikt Driessen , Markus Dürmuth
14th International Conference on Communications and Multimedia Security (CMS), Sep 2013, Magdeburg,, Germany. pp.18-33, ⟨10.1007/978-3-642-40779-6_2⟩
Conference papers hal-01492830v1
Image document

Transparency Heuristic: Effect of Implicitness of Online Data Acquisition on Sensitivity Perception

Mariavittoria Masotina , Patrik Pluchino , Francesca Freuli , Luciano Gamberini , Anna Spagnolli
17th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2019, Paphos, Cyprus. pp.676-679, ⟨10.1007/978-3-030-29390-1_61⟩
Conference papers hal-02878652v1
Image document

Enhanced Privacy Protection in Blockchain Using SGX and Sidechains

M. Mohideen Abdulkader , S. Ganesh Kumar
4th International Conference on Computational Intelligence in Data Science (ICCIDS), Mar 2021, Chennai, India. pp.200-209, ⟨10.1007/978-3-030-92600-7_19⟩
Conference papers hal-03772926v1
Image document

k-Anonymity-Based Horizontal Fragmentation to Preserve Privacy in Data Outsourcing

Abbas Taheri Soodejani , Mohammad Ali Hadavi , Rasool Jalili
26th Conference on Data and Applications Security and Privacy (DBSec), Jul 2012, Paris, France. pp.263-273, ⟨10.1007/978-3-642-31540-4_20⟩
Conference papers hal-01534772v1