Sciweavers

1790 search results - page 67 / 358
» On Privacy Models for RFID
Sort
View
SDM
2008
SIAM
135views Data Mining» more  SDM 2008»
15 years 1 months ago
Preemptive Measures against Malicious Party in Privacy-Preserving Data Mining
Currently, many privacy-preserving data mining (PPDM) algorithms assume the semi-honest model and/or malicious model of multi-party interaction. However, both models are far from ...
Shuguo Han, Wee Keong Ng
SDM
2007
SIAM
190views Data Mining» more  SDM 2007»
15 years 1 months ago
AC-Framework for Privacy-Preserving Collaboration
The secure multi-party computation (SMC) model provides means for balancing the use and confidentiality of distributed data. Increasing security concerns have led to a surge in w...
Wei Jiang, Chris Clifton
GVD
2009
108views Database» more  GVD 2009»
14 years 9 months ago
Privacy Challenges for Database Systems
Over the last years the means to collect personal data implicitly or explicitly over the Web and by various kinds of sensors and to combine data for profiling individuals has dram...
Johann Christoph Freytag
PERCOM
2005
ACM
15 years 11 months ago
Modeling Context-Aware e-Learning Scenarios
In the last decade, e-learning has been introduced to a variety of blended learning scenarios, such as life-long learning, University lectures, and game-based learning. In all the...
Michael Derntl, Karin Anna Hummel
PERCOM
2007
ACM
15 years 11 months ago
A Simple Model and Infrastructure for Context-Aware Browsing of the World
The imminent mass deployment of pervasive computing technologies such as sensor networks and RFID tags, together with the increasing participation of the Web community in feeding ...
Gabriella Castelli, Alberto Rosi, Marco Mamei, Fra...