• No results found

Privacy and anonymity

Security Protocols with Privacy and Anonymity of Users

Security Protocols with Privacy and Anonymity of Users

... user privacy and anonymity may at first seem contradictory or even ...user privacy and ...user privacy and anonymity cannot be ...

10

Maintaining Location Privacy and Anonymity for Vehicle’s Drivers in VANET

Maintaining Location Privacy and Anonymity for Vehicle’s Drivers in VANET

... breaching privacy of vehicle ...location privacy of a user and anonymity when using real-time applications, while taking into consideration constraints posed by ...

33

ACHIEVING USER PRIVACY AND ANONYMITY IN WIRELESS MESH NETWORKS USING ANONYMOUS PROTOCOL

ACHIEVING USER PRIVACY AND ANONYMITY IN WIRELESS MESH NETWORKS USING ANONYMOUS PROTOCOL

... the anonymity scheme, other security issues such as authentication, key establishment, and revocation are critical in WMNs to ensure the correct application of the anonymity ...access anonymity and ...

7

Privacy in the Digital Age of Encryption and Anonymity Online

Privacy in the Digital Age of Encryption and Anonymity Online

... on privacy in the digital age of encryption and anonymity ...balance privacy and security with a focus on the latest systems of encryption, anonymisation and ...

7

(alpha, k)-anonymity: an enhanced k-anonymity model for privacy preserving data publishing

(alpha, k)-anonymity: an enhanced k-anonymity model for privacy preserving data publishing

... In this paper, we focus on a study on the k-anonymity prop- erty [11, 10]. The k-anonymity model assumes a quasi-identifier, which is a set of attributes that may serve as an identifier in the data set. It ...

6

Enhancing the privacy of e-learning systems with alias and anonymity

Enhancing the privacy of e-learning systems with alias and anonymity

... From the previous section, we have demonstrated how to use the alias for implement- ing privacy preservation for e-learning systems. It is obvious that the alias will be familiar by other users if the alias is ...

12

A K Anonymity Based Schema for Location Privacy Preservation

A K Anonymity Based Schema for Location Privacy Preservation

... the privacy preservation based on k− anonymity principle meanwhile reduce the cost for privacy ...the privacy level and in each group one proxy is selected to generate dummy locations and ...

13

Achieving k Anonymity Privacy Protection using Agents

Achieving k Anonymity Privacy Protection using Agents

... the privacy policy ...k-anonymity privacy protection using agents. where k-anonymity means given data is more general form so that the identification of particular user not so far ...access, ...

6

Survey on Data Privacy in Big Data with K- Anonymity

Survey on Data Privacy in Big Data with K- Anonymity

... K- Anonymity; Alpha K Anonymity ...data privacy is an important factor for data mining with big ...K- Anonymity is the method that anonymized data fields such that sensitive information cannot ...

7

Modified Anonymity Model for Privacy Preserving Data Mining

Modified Anonymity Model for Privacy Preserving Data Mining

... Data mining is a technique that helps to extract useful information from a large database. As the amount of data doubles every three years, data mining is becoming an increasingly important tool to transform this data ...

7

Increasing Data Anonymity using AES and Privacy Technique

Increasing Data Anonymity using AES and Privacy Technique

... foundational privacy, anonymity and diversity models l , And many data and power in the dataset, the algorithm has been used by (Brown, ...differential privacy can be associated with a small number, ...

6

Trajectory Privacy in Participatory Sensing using K-anonymity

Trajectory Privacy in Participatory Sensing using K-anonymity

... Trajectory privacy-preserving framework user’s location is preserved using various techniques, but the locations of users trajectories may not sensitive all the ...location privacy through ensuring location ...

7

Distributed Privacy preserving and Handling Privacy information leakage by using  k  anonymity algorithm

Distributed Privacy preserving and Handling Privacy information leakage by using k anonymity algorithm

... There is increasing pressure to disclose health research data, and this is especially true when the data has been collected using public funds. However, the disclosure of such data raises serious privacy concerns. ...

9

Privacy Preservation in Data Centric Environment using K Anonymity

Privacy Preservation in Data Centric Environment using K Anonymity

... Abstract: Due to the expansion in healthcare information systems, the availability of therapeutic reports has benefitted human administration organizations to inquire about work. In numerous cases, these are creating ...

8

S-KACA Anonymity Privacy Protection Based on Clustering Algorithm

S-KACA Anonymity Privacy Protection Based on Clustering Algorithm

... sensitive privacy protection degree according to the different sensitive information attributes to realize the K-anonymization of the ...sensitive privacy protection degree can better anonymize data, and ...

7

Trajectory Rotation Privacy Protection Algorithm Based on k Anonymity

Trajectory Rotation Privacy Protection Algorithm Based on k Anonymity

... trajectory privacy, the context adds in- stant traffic monitoring based on user behavior patterns, trajectory similarity and other background ...k anonymity, proposed a method combined with traffic ...

12

Privacy, Anonymity and Pseudonymity in Business Transactions over the Internet. Contents

Privacy, Anonymity and Pseudonymity in Business Transactions over the Internet. Contents

... Privacy, Anonymity and Pseudonymity in Business Transactions over the Internet.. Internet Economics Seminar.[r] ...

16

Preserving Privacy in Social Networking Systems: Policy-Based Control and Anonymity

Preserving Privacy in Social Networking Systems: Policy-Based Control and Anonymity

... the anonymity properties of the k -anonymity-based schemes such as Supergraph and ...same anonymity node measure in the en- hanced versions of the algorithms compared to their corresponding original ...

120

A new anonymity-based protocol preserving privacy based cloud environment

A new anonymity-based protocol preserving privacy based cloud environment

... 9 Conclusions Cloud computing has been envisioned as the next generation architecture of IT Enterprise. This technology not only gave us more convenience, but also exposed some security problem. When people access cloud ...

6

Enhanced p-sensitive k-anonymity models for privacy preserving data publishing

Enhanced p-sensitive k-anonymity models for privacy preserving data publishing

... of privacy disclosure, one frequently used solution is to modify the initial micro data, more specifically the quasi-identifier attributes values, in order to enforce the k-anonymity ...

14

Show all 10000 documents...

Related subjects