How to Build a Digital Library reviews knowledge and tools to construct and maintain a digital library, regardless of the size or purpose. A resource for individuals, agencies, and …
DC Sicker, P Ohm, D Grunwald - Proceedings of the 7th ACM SIGCOMM …, 2007 - dl.acm.org
This work was motivated by a discussion that two of the coauthors (computer science professors) had with the other coauthor (a law professor and a former computer crime Trial …
LJ Trautman - Wm. & Mary Bus. L. Rev., 2018 - HeinOnline
By now, almost every business has an Internet presence. What are the major risks perceived by those engaged in the universe of Internet businesses? What potential risks, if they …
We present a mathematical formulation for the optimization of query forgery for private information retrieval, in the sense that the privacy risk is minimized for a given traffic and …
We address the problem of query profile obfuscation by means of partial query exchanges between two users, in order for their profiles of interest to appear distorted to the information …
ST Peddinti, N Saxena - Journal of Computer Security, 2014 - content.iospress.com
Web Search is one of the most rapidly growing applications on the internet today. However, the current practice followed by most search engines–of logging and analyzing users' …
Internet-based services process and store numerous search queries around the globe. The use of web search engines, such as Bing and Google, as well as personal assistants (eg …
We present a multidisciplinary solution to the problems of anonymous microaggregation and clustering, illustrated with two applications, namely privacy protection in databases, and …