Sciweavers

3395 search results - page 136 / 679
» Computational Differential Privacy
Sort
View
UCS
2007
Springer
15 years 7 months ago
RFID Privacy Using Spatially Distributed Shared Secrets
Many of today’s proposed RFID privacy schemes rely on the encryption of tag IDs with user-chosen keys. However, password management quickly becomes a bottleneck in such proposals...
Marc Langheinrich, Remo Marti
WS
2006
ACM
15 years 7 months ago
Location privacy in wireless personal area networks
Location privacy is one of the major security problems in a Wireless Personal Area Network (WPAN). By eavesdropping on the transmitted packets, an attacker can keep track of the p...
Dave Singelée, Bart Preneel
PET
2005
Springer
15 years 6 months ago
High-Power Proxies for Enhancing RFID Privacy and Utility
A basic radio-frequency identification (RFID) tag is a small and inexpensive microchip that emits a static identifier in response to a query from a nearby reader. Basic tags of t...
Ari Juels, Paul F. Syverson, Daniel V. Bailey
GRC
2007
IEEE
15 years 1 months ago
Privacy Preserving Collaborative Filtering Using Data Obfuscation
Collaborative filtering (CF) systems are being widely used in E-commerce applications to provide recommendations to users regarding products that might be of interest to them. Th...
Rupa Parameswaran, Douglas M. Blough
123
Voted
PERCOM
2011
ACM
14 years 4 months ago
Towards preserving privacy in participatory sensing
Abstract—With the abundance and ubiquity of mobile devices, a new class of applications is emerging, called participatory sensing (PS), where people can contribute data (e.g., im...
Leyla Kazemi, Cyrus Shahabi