Sciweavers

169 search results - page 15 / 34
» A Revocation Scheme Preserving Privacy
Sort
View
NDSS
2005
IEEE
15 years 10 months ago
Privacy-Preserving Friends Troubleshooting Network
— Content sharing is a popular use of peer-to-peer systems because of their inherent scalability and low cost of maintenance. In this paper, we leverage this nature of peer-topee...
Qiang Huang, Helen J. Wang, Nikita Borisov
ICDM
2003
IEEE
142views Data Mining» more  ICDM 2003»
15 years 10 months ago
Privacy-Preserving Collaborative Filtering Using Randomized Perturbation Techniques
Collaborative Filtering (CF) techniques are becoming increasingly popular with the evolution of the Internet. E-commerce sites use CF systems to suggest products to customers base...
Huseyin Polat, Wenliang Du
152
Voted
ESORICS
2008
Springer
15 years 7 months ago
Sharemind: A Framework for Fast Privacy-Preserving Computations
Gathering and processing sensitive data is a difficult task. In fact, there is no common recipe for building the necessary information systems. In this paper, we present a provably...
Dan Bogdanov, Sven Laur, Jan Willemson
SAC
2005
ACM
15 years 10 months ago
Privacy preserving learning in negotiation
Machine learning techniques are widely used in negotiation systems. To get more accurate and satisfactory learning results, negotiation parties have the desire to employ learning ...
Sheng Zhang, Fillia Makedon
ESORICS
2009
Springer
16 years 1 days ago
Towards a Privacy-Preserving National Identity Card
In this paper, we propose to replace the national identity card, currently used in many countries, by a personal device that allows its user to prove some binary statements about h...
Yves Deswarte, Sébastien Gambs