Sciweavers

3395 search results - page 95 / 679
» Computational Differential Privacy
Sort
View
PDCAT
2007
Springer
15 years 4 months ago
Privacy Preserving Set Intersection Protocol Secure against Malicious Behaviors
When datasets are distributed on different sources, finding out their intersection while preserving the privacy of the datasets is a widely required task. In this paper, we addre...
Yingpeng Sang, Hong Shen
PET
2012
Springer
13 years 16 days ago
PRISM - Privacy-Preserving Search in MapReduce
We present PRISM, a privacy-preserving scheme for word search in cloud computing. In the face of a curious cloud provider, the main challenge is to design a scheme that achieves pr...
Erik-Oliver Blass, Roberto Di Pietro, Refik Molva,...
GRC
2007
IEEE
15 years 4 months ago
Privacy in the Information and Communications Technologies
— Information and Communications Technologies (ICT) are fostering the appearance of a plethora of new services and applications. On the one hand, ICT will improve the efficiency...
Antoni Martínez-Ballesté, Agusti Sol...
CHI
2009
ACM
15 years 5 months ago
Tagged photos: concerns, perceptions, and protections
Photo sharing has become a popular feature of many online social networking sites. Many of the photo sharing applications on these sites, allow users to annotate photos with those...
Andrew Besmer, Heather Richter Lipford
MDM
2004
Springer
15 years 3 months ago
Enabling Context-Aware and Privacy-Conscious User Data Sharing
This paper provides detail on two key components of the Houdini framework under development at Bell Labs, that enable context-aware and privacy-conscious user data sharing appropr...
Richard Hull, Bharat Kumar, Daniel F. Lieuwen, Pet...