Sciweavers

1906 search results - page 333 / 382
» Data Privacy
Sort
View
120
Voted
SIGKDD
2010
159views more  SIGKDD 2010»
15 years 1 months ago
Providing K-Anonymity in location based services
The offering of anonymity in relational databases has attracted a great deal of attention in the database community during the last decade [4]. Among the different solution appr...
Aris Gkoulalas-Divanis, Panos Kalnis, Vassilios S....
SIGMOD
2010
ACM
155views Database» more  SIGMOD 2010»
15 years 1 months ago
Search in social networks with access control
More and more important data is accumulated inside social networks. Limiting the flow of private information across a social network is very important, and most social networks pr...
Truls Amundsen Bjørklund, Michaela Göt...
149
Voted
WOA
2010
15 years 1 months ago
A Multi-Agent Implementation of Social Networks
In this paper, we present a multi-agent system implementing a fully distributed Social Network System supporting user profiles as FOAF profiles. This system is built around the ide...
Enrico Franchi
JMLR
2010
169views more  JMLR 2010»
14 years 10 months ago
Consensus-Based Distributed Support Vector Machines
This paper develops algorithms to train support vector machines when training data are distributed across different nodes, and their communication to a centralized processing unit...
Pedro A. Forero, Alfonso Cano, Georgios B. Giannak...
118
Voted
ACNS
2004
Springer
106views Cryptology» more  ACNS 2004»
15 years 8 months ago
On the Security of Cryptosystems with All-or-Nothing Transform
We study the data privacy of cryptosystems with All-or-Nothing transform (AONT). An AONT is an efficient computable transform with two properties: Given all the bits of its output...
Rui Zhang 0002, Goichiro Hanaoka, Hideki Imai