Sciweavers

2001 search results - page 43 / 401
» A security architecture for data privacy and security
Sort
View
HICSS
2011
IEEE
203views Biometrics» more  HICSS 2011»
14 years 3 months ago
Will HITECH Heal Patient Data Hemorrhages?
Hemorrhages of confidential patient health data create privacy and security concerns. While the US HIPAA legislation on privacy and security went into effect over five years ago, ...
M. Eric Johnson, Nicholas D. Willey
NCA
2011
IEEE
14 years 6 months ago
Privacy preserving Back-propagation neural network learning over arbitrarily partitioned data
—Neural Networks have been an active research area for decades. However, privacy bothers many when the training dataset for the neural networks is distributed between two parties...
Ankur Bansal, Tingting Chen, Sheng Zhong
ICISC
2004
173views Cryptology» more  ICISC 2004»
15 years 1 months ago
On Private Scalar Product Computation for Privacy-Preserving Data Mining
In mining and integrating data from multiple sources, there are many privacy and security issues. In several different contexts, the security of the full privacy-preserving data mi...
Bart Goethals, Sven Laur, Helger Lipmaa, Taneli Mi...
WS
2005
ACM
15 years 5 months ago
The security of vehicular networks
Vehicular networks are likely to become the most relevant form of ad hoc networks. In this paper, we address the security of these networks. We provide a detailed threat analysis ...
Jean-Pierre Hubaux
SIGKDD
2002
90views more  SIGKDD 2002»
14 years 11 months ago
Cryptographic Techniques for Privacy-Preserving Data Mining
Research in secure distributed computation, which was done as part of a larger body of research in the theory of cryptography, has achieved remarkable results. It was shown that n...
Benny Pinkas