Sciweavers

1790 search results - page 89 / 358
» On Privacy Models for RFID
Sort
View
ICC
2007
IEEE
121views Communications» more  ICC 2007»
15 years 11 months ago
An Architecture for Network Layer Privacy
— We present an architecture for the provision of network layer privacy based on the SHIM6 multihoming protocol. In its basic form, the architecture prevents on-path eavesdropper...
Marcelo Bagnulo, Alberto García-Martí...
ITNG
2006
IEEE
15 years 11 months ago
A Study on the Security of Privacy Homomorphism
Informally, Privacy Homomorphism (PH) refers to encryption schemes with a homomorphic property allowing to obtain Ek(a + b) or Ek(a × b) from ciphertexts Ek(a) and Ek(b) without ...
Yu Yu, Jussipekka Leiwo, Benjamin Premkumar
CCIA
2008
Springer
15 years 7 months ago
Privacy in Distributed Meeting Scheduling
Meetings are an important vehicle for human interaction. The Meeting Scheduling problem (MS) considers several agents, each holding a personal calendar, and a number of meetings wh...
Ismel Brito, Pedro Meseguer
CSFW
2007
IEEE
15 years 11 months ago
Collaborative Planning With Privacy
Collaboration among organizations or individuals is common. While these participants are often unwilling to share all their information with each other, some information sharing i...
Max I. Kanovich, Paul Rowe, Andre Scedrov
147
Voted
ICDM
2005
IEEE
153views Data Mining» more  ICDM 2005»
15 years 11 months ago
Privacy-Preserving Frequent Pattern Mining across Private Databases
Privacy consideration has much significance in the application of data mining. It is very important that the privacy of individual parties will not be exposed when data mining te...
Ada Wai-Chee Fu, Raymond Chi-Wing Wong, Ke Wang