Sciweavers

1790 search results - page 101 / 358
» On Privacy Models for RFID
Sort
View
DASFAA
2010
IEEE
148views Database» more  DASFAA 2010»
15 years 9 months ago
Competitive Privacy: Secure Analysis on Integrated Sequence Data
Sequence data analysis has been extensively studied in the literature. However, most previous work focuses on analyzing sequence data from a single source or party. In many applica...
Raymond Chi-Wing Wong, Eric Lo
JTAER
2007
78views more  JTAER 2007»
15 years 5 months ago
A System for Locating Mobile Terminals with Tunable Privacy
A number of approaches for capturing and processing location information of mobile users have been proposed in the past; however, only with the latest advances in the handset tech...
Sandford Bessler
SP
2002
IEEE
141views Security Privacy» more  SP 2002»
15 years 5 months ago
Collaborative Filtering with Privacy
Server-based collaborative filtering systems have been very successful in e-commerce and in direct recommendation applications. In future, they have many potential applications in...
John F. Canny
TDSC
2011
15 years 11 days ago
An Obfuscation-Based Approach for Protecting Location Privacy
—The pervasive diffusion of mobile communication devices and the technical improvements of location techniques are fostering the development of new applications that use the phys...
Claudio Agostino Ardagna, Marco Cremonini, Sabrina...
WWW
2009
ACM
16 years 6 months ago
To join or not to join: the illusion of privacy in social networks with mixed public and private user profiles
In order to address privacy concerns, many social media websites allow users to hide their personal profiles from the public. In this work, we show how an adversary can exploit an...
Elena Zheleva, Lise Getoor