Sciweavers

1790 search results - page 66 / 358
» On Privacy Models for RFID
Sort
View
IEEEARES
2009
IEEE
15 years 6 months ago
Measuring Voter-Controlled Privacy
—In voting, the notion of receipt-freeness has been proposed to express that a voter cannot gain any information to prove that she has voted in a certain way. It aims to prevent ...
Hugo L. Jonker, Sjouke Mauw, Jun Pang
CSE
2009
IEEE
15 years 6 months ago
Noise Injection for Search Privacy Protection
Abstract—Extensive work has been devoted to private information retrieval and privacy preserving data mining. To protect user privacy from search engines, however, most current a...
Shaozhi Ye, Shyhtsun Felix Wu, Raju Pandey, Hao Ch...
JUCS
2010
162views more  JUCS 2010»
14 years 10 months ago
Enabling Personal Privacy for Pervasive Computing Environments
: Protection of personal data in the Internet is already a challenge today. Users have to actively look up privacy policies of websites and decide whether they can live with the te...
Susana Alcalde Bagüés, Andreas Zeidler...
SIGMOD
2009
ACM
185views Database» more  SIGMOD 2009»
16 years 3 days ago
Attacks on privacy and deFinetti's theorem
In this paper we present a method for reasoning about privacy using the concepts of exchangeability and deFinetti's theorem. We illustrate the usefulness of this technique by...
Daniel Kifer
ECWEB
2009
Springer
112views ECommerce» more  ECWEB 2009»
15 years 6 months ago
Towards Privacy Compliant and Anytime Recommender Systems
Abstract. Recommendation technologies have traditionally been used in domains such as E-commerce and Web navigation to recommend resources to customers so as to help them to get th...
Armelle Brun, Anne Boyer