Sciweavers

1402 search results - page 135 / 281
» Personalized privacy preservation
Sort
View
116
Voted
CRYPTO
2006
Springer
149views Cryptology» more  CRYPTO 2006»
15 years 4 months ago
On Combining Privacy with Guaranteed Output Delivery in Secure Multiparty Computation
In the setting of multiparty computation, a set of parties wish to jointly compute a function of their inputs, while preserving security in the case that some subset of them are co...
Yuval Ishai, Eyal Kushilevitz, Yehuda Lindell, Ere...
70
Voted
PERVASIVE
2005
Springer
15 years 6 months ago
AwareMirror: A Personalized Display Using a Mirror
Abstract. In this paper, we propose a personalized display, “AwareMirror: an augmented mirror”. AwareMirror presents information relevant to a person in front of it by super-im...
Kaori Fujinami, Fahim Kawsar, Tatsuo Nakajima
121
Voted
GIS
2009
ACM
14 years 10 months ago
Distortion-based anonymity for continuous queries in location-based mobile services
Privacy preservation has recently received considerable attention for location-based mobile services. Various location cloaking approaches have been proposed to protect the locati...
Xiao Pan, Xiaofeng Meng, Jianliang Xu
126
Voted
ECCV
2008
Springer
16 years 2 months ago
Illumination and Person-Insensitive Head Pose Estimation Using Distance Metric Learning
Head pose estimation is an important task for many face analysis applications, such as face recognition systems and human computer interactions. In this paper we aim to address the...
Xianwang Wang, Xinyu Huang, Jizhou Gao, Ruigang Ya...
VLDB
2006
ACM
122views Database» more  VLDB 2006»
16 years 1 months ago
A secure distributed framework for achieving k-anonymity
k-anonymity provides a measure of privacy protection by preventing re-identification of data to fewer than a group of k data items. While algorithms exist for producing k-anonymous...
Wei Jiang, Chris Clifton