Sciweavers

3395 search results - page 141 / 679
» Computational Differential Privacy
Sort
View
129
Voted
PET
2010
Springer
15 years 3 months ago
Achieving Efficient Query Privacy for Location Based Services
Mobile smartphone users frequently need to search for nearby points of interest from a location based service, but in a way that preserves the privacy of the users' locations...
Femi G. Olumofin, Piotr K. Tysowski, Ian Goldberg,...
98
Voted
CHI
2005
ACM
16 years 1 months ago
Who gets to know what when: configuring privacy permissions in an awareness application
We report on a study (N=36) of user preferences for balancing awareness with privacy. Participants defined permissions for sharing of location, availability, calendar information ...
Sameer Patil, Jennifer Lai
132
Voted
HUC
2010
Springer
15 years 2 months ago
Empirical models of privacy in location sharing
The rapid adoption of location tracking and mobile social networking technologies raises significant privacy challenges. Today our understanding of people's location sharing ...
Eran Toch, Justin Cranshaw, Paul Hankes Drielsma, ...
CORR
2011
Springer
196views Education» more  CORR 2011»
14 years 4 months ago
Privacy-Enhanced Reputation-Feedback Methods to Reduce Feedback Extortion in Online Auctions
In this paper, we study methods for improving the utility and privacy of reputation scores for online auctions, such as used in eBay, so as to reduce the effectiveness of feedbac...
Michael T. Goodrich, Florian Kerschbaum
ICPR
2004
IEEE
16 years 2 months ago
Stealth Vision for Protecting Privacy
We propose an anonymous video capturing system, called "Stealth Vision", that protects the privacy of objects by fading out their appearance. In order to avoid difficult...
Itaru Kitahara, Kiyoshi Kogure, Norihiro Hagita