Sciweavers

1402 search results - page 153 / 281
» Personalized privacy preservation
Sort
View
93
Voted
NSPW
2003
ACM
15 years 6 months ago
Owner-controlled information
Large-scale data breaches exposing sensitive personal information are becoming commonplace. For numerous reasons, conventional personal (identification) information leaks from da...
Carrie Gates, Jacob Slonim
115
Voted
CTRSA
2008
Springer
197views Cryptology» more  CTRSA 2008»
15 years 2 months ago
Legally-Enforceable Fairness in Secure Two-Party Computation
In the setting of secure multiparty computation, a set of mutually distrustful parties wish to securely compute some joint function of their private inputs. The computation should...
Andrew Y. Lindell
97
Voted
KDD
2005
ACM
109views Data Mining» more  KDD 2005»
16 years 1 months ago
A new scheme on privacy-preserving data classification
We address privacy-preserving classification problem in a distributed system. Randomization has been the approach proposed to preserve privacy in such scenario. However, this appr...
Nan Zhang 0004, Shengquan Wang, Wei Zhao
128
Voted
CSCW
1998
ACM
15 years 5 months ago
Evaluating Image Filtering Based Techniques in Media Space Applications
Media space applications that promote informal awareness in an organization confront an inevitable paradox: the shared video connections between offices and rooms that promote inf...
Qiang Alex Zhao, John T. Stasko
117
Voted
PVLDB
2008
146views more  PVLDB 2008»
15 years 5 days ago
Resisting structural re-identification in anonymized social networks
We identify privacy risks associated with releasing network data sets and provide an algorithm that mitigates those risks. A network consists of entities connected by links repres...
Michael Hay, Gerome Miklau, David Jensen, Donald F...