Sciweavers

1790 search results - page 75 / 358
» On Privacy Models for RFID
Sort
View
177
Voted
CCS
2011
ACM
14 years 5 months ago
Televisions, video privacy, and powerline electromagnetic interference
We conduct an extensive study of information leakage over the powerline infrastructure from eight televisions (TVs) spanning multiple makes, models, and underlying technologies. I...
Miro Enev, Sidhant Gupta, Tadayoshi Kohno, Shwetak...
155
Voted
IACR
2011
101views more  IACR 2011»
14 years 5 months ago
Policy-Enhanced Private Set Intersection: Sharing Information While Enforcing Privacy Policies
Companies, organizations, and individuals often wish to share information to realize valuable social and economic goals. Unfortunately, privacy concerns often stand in the way of ...
Emil Stefanov, Elaine Shi, Dawn Song
CORR
2010
Springer
61views Education» more  CORR 2010»
15 years 5 months ago
Utility and Privacy of Data Sources: Can Shannon Help Conceal and Reveal Information?
Abstract-- The problem of private information "leakage" (inadvertently or by malicious design) from the myriad large centralized searchable data repositories drives the n...
Lalitha Sankar, S. Raj Rajagopalan, H. Vincent Poo...
ICTAI
2006
IEEE
15 years 11 months ago
Sequence Mining Without Sequences: A New Way for Privacy Preserving
During the last decade, sequential pattern mining has been the core of numerous researches. It is now possible to efficiently discover users’ behavior in various domains such a...
Stéphanie Jacquemont, François Jacqu...
168
Voted
REFSQ
2010
Springer
15 years 7 months ago
Towards a Framework to Elicit and Manage Security and Privacy Requirements from Laws and Regulations
[Context and motivation] The increasing demand of software systems to process and manage sensitive information has led to the need that software systems should comply with relevant...
Shareeful Islam, Haralambos Mouratidis, Stefan Wag...