Zobrazeno 1 - 10
of 20
pro vyhledávání: '"Ken Mano"'
Publikováno v:
IEICE Transactions on Information and Systems. :181-194
Publikováno v:
Annals of Mathematics and Artificial Intelligence. 78:101-129
In this paper, we exploit epistemic logic (or the modal logic of knowledge) for multiagent systems to discuss the compositionality of several privacy-related information-hiding/disclosure properties. The properties considered here are anonymity, priv
Autor:
Ken MANO
Publikováno v:
IEICE Transactions on Information and Systems. :1782-1782
Publikováno v:
Journal of Logic and Computation. 20:1251-1288
We propose a new information-hiding property called role interchangeability for the verification of the anonymity and privacy of security protocols. First, we formally specify the new property in multi-agent systems, and describe its relationship wit
Publikováno v:
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. :2597-2606
Many Internet services and protocols should guarantee anonymity; for example, an electronic voting system should guarantee to prevent the disclosure of who voted for which candidate. To prove trace anonymity, which is an extension of the formulation
Publikováno v:
Information Processing Letters. 101:46-51
Publikováno v:
Systems and Computers in Japan. 36:78-91
Publikováno v:
GCCE
Anonymization is a common technique for publishing a location data set in a privacy-preserving way. However, such an anonymized data set lacks trajectory information of users, which could be beneficial to many location-based analytic services. In thi
Autor:
Mizuhito Ogawa, Ken Mano
Publikováno v:
Theoretical Computer Science. 258:169-208
We present a new and complete proof of Chew's theorem, which states that a compatible term rewriting system has the unique normal form property, i.e., a↔ ∗ b implies a ≡ b for any normal forms a , b .
Publikováno v:
Information and Communication Technology ISBN: 9783642550317
ICT-EurAsia
ICT-EurAsia
Pseudonymization is a promising technique for publishing a trajectory location data set in a privacy-preserving way. However, it is not trivial to determine whether a given data set is safely publishable against an adversary with partial knowledge ab
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::6df9b9397a385472194d7471ed7ec424
https://doi.org/10.1007/978-3-642-55032-4_52
https://doi.org/10.1007/978-3-642-55032-4_52