Sciweavers

1402 search results - page 144 / 281
» Personalized privacy preservation
Sort
View
93
Voted
CHI
2005
ACM
16 years 1 months ago
Who gets to know what when: configuring privacy permissions in an awareness application
We report on a study (N=36) of user preferences for balancing awareness with privacy. Participants defined permissions for sharing of location, availability, calendar information ...
Sameer Patil, Jennifer Lai
118
Voted
MSWIM
2009
ACM
15 years 7 months ago
On providing location privacy for mobile sinks in wireless sensor networks
Wireless sensor networks have attracted increasing attentions considering their potentials for being widely adopted in both emerging civil and military applications. A common prac...
Edith C.-H. Ngai, Ioana Rodhe
141
Voted
CORR
2011
Springer
196views Education» more  CORR 2011»
14 years 4 months ago
Privacy-Enhanced Reputation-Feedback Methods to Reduce Feedback Extortion in Online Auctions
In this paper, we study methods for improving the utility and privacy of reputation scores for online auctions, such as used in eBay, so as to reduce the effectiveness of feedbac...
Michael T. Goodrich, Florian Kerschbaum
85
Voted
IWSEC
2007
Springer
15 years 6 months ago
Accredited Symmetrically Private Information Retrieval
Abstract. With the digitization of society and the continuous migration of services to the electronic world, individuals have lost significant control over their data. In this pap...
Mohamed Layouni
86
Voted
WMCSA
2012
IEEE
13 years 8 months ago
An amulet for trustworthy wearable mHealth
Mobile technology has significant potential to help revolutionize personal wellness and the delivery of healthcare. Mobile phones, wearable sensors, and home-based tele-medicine ...
Jacob Sorber, Minho Shin, Ronald A. Peterson, Cory...