Sciweavers

3395 search results - page 132 / 679
» Computational Differential Privacy
Sort
View
ICDCS
2008
IEEE
15 years 7 months ago
A Sophisticated Privacy-Enhanced Yet Accountable Security Framework for Metropolitan Wireless Mesh Networks
— Recently, multi-hop wireless mesh networks (WMNs) have attracted increasing attention and deployment as a low-cost approach to provide broadband Internet access at metropolitan...
Kui Ren, Wenjing Lou
112
Voted
PERVASIVE
2007
Springer
15 years 7 months ago
Virtual Walls: Protecting Digital Privacy in Pervasive Environments
As pervasive environments become more commonplace, the privacy of users is placed at increased risk. The numerous and diverse sensors in these environments can record users’ cont...
Apu Kapadia, Tristan Henderson, Jeffrey J. Fieldin...
109
Voted
ICDM
2006
IEEE
139views Data Mining» more  ICDM 2006»
15 years 6 months ago
Privacy Preserving Nearest Neighbor Search
Data mining is frequently obstructed by privacy concerns. In many cases data is distributed, and bringing the data together in one place for analysis is not possible due to privac...
Mark Shaneck, Yongdae Kim, Vipin Kumar
87
Voted
NORDICHI
2006
ACM
15 years 6 months ago
How ordinary internet users can have a chance to influence privacy policies
By ‘Obligation Management’ we refer to the definition, automated enforcement, and monitoring of privacy obligation policies. Privacy policies are nowadays found on most organi...
John Sören Pettersson, Simone Fischer-Hü...
97
Voted
POLICY
2007
Springer
15 years 7 months ago
Towards Privacy-Aware Handling of Authorizations
Privacy issues have hindered centralised authentication approaches from being adopted by a wide range of users. This also applies to authorizations which suffer from privacy probl...
Wolfgang Dobmeier, Günther Pernul