Sciweavers

712 search results - page 36 / 143
» A Study on the Security of Privacy Homomorphism
Sort
View
94
Voted
CCS
2010
ACM
15 years 1 months ago
Towards publishing recommendation data with predictive anonymization
Recommender systems are used to predict user preferences for products or services. In order to seek better prediction techniques, data owners of recommender systems such as Netfli...
Chih-Cheng Chang, Brian Thompson, Hui (Wendy) Wang...
AINA
2005
IEEE
15 years 3 months ago
A Scheme for Testing Privacy State in Pervasive Sensor Networks
More and more sensor networks will be deployed in the place where people are living, studying, and working. These sensor networks bring us the convenience of accessing information...
Yingpeng Sang, Hong Shen
STORAGESS
2005
ACM
15 years 3 months ago
Security of erasable memories against adaptive adversaries
We study cryptographic modeling and encryption-based design techniques for guaranteeing privacy of data that is first stored in some type of computer memory and then deleted. We ...
Giovanni Di Crescenzo
CSFW
2000
IEEE
15 years 2 months ago
Information Flow Analysis in a Discrete-Time Process Algebra
Some of the non interference properties studied in [4, 6, 18] for information flow analysis in computer systems, notably Æ , are reformulated here in a realtime setting. This is...
Riccardo Focardi, Roberto Gorrieri, Fabio Martinel...
IEEEARES
2006
IEEE
15 years 3 months ago
The Security Issue of Federated Data Warehouses in the Area of Evidence-Based Medicine
Healthcare organisations practicing evidence-based medicine strive to unite their data assets in order to achieve a wider knowledge base for more sophisticated research as well as...
Nevena Stolba, Marko Banek, A. Min Tjoa