Sciweavers

169 search results - page 11 / 34
» A Revocation Scheme Preserving Privacy
Sort
View
PAKDD
2007
ACM
140views Data Mining» more  PAKDD 2007»
15 years 10 months ago
A Hybrid Multi-group Privacy-Preserving Approach for Building Decision Trees
In this paper, we study the privacy-preserving decision tree building problem on vertically partitioned data. We made two contributions. First, we propose a novel hybrid approach, ...
Zhouxuan Teng, Wenliang Du
IEEEARES
2008
IEEE
15 years 11 months ago
Privacy-Preserving Distributed Set Intersection
With the growing demand of databases outsourcing and its security concerns, we investigate privacy-preserving set intersection in a distributed scenario. We propose a one-round pr...
Qingsong Ye, Huaxiong Wang, Christophe Tartary
DASFAA
2004
IEEE
164views Database» more  DASFAA 2004»
15 years 8 months ago
On Addressing Efficiency Concerns in Privacy-Preserving Mining
Data mining services require accurate input data for their results to be meaningful, but privacy concerns may influence users to provide spurious information. To encourage users to...
Shipra Agrawal, Vijay Krishnan, Jayant R. Haritsa
EDBTW
2010
Springer
15 years 11 months ago
Key escrow schemes with sliding window for privacy-aware anomaly detection system
Requirements for a traffic monitoring system can be very demanding as both privacy and performance aspects have to be taken into account jointly. Moreover, the legislation sets fo...
Esa Hyytiä, Ivan Gojmerac, Simone Teofili, Gi...
ICISC
2009
184views Cryptology» more  ICISC 2009»
15 years 2 months ago
Efficient Privacy-Preserving Face Recognition
Abstract. Automatic recognition of human faces is becoming increasingly popular in civilian and law enforcement applications that require reliable recognition of humans. However, t...
Ahmad-Reza Sadeghi, Thomas Schneider 0003, Immo We...