Sciweavers

1402 search results - page 29 / 281
» Personalized privacy preservation
Sort
View
SDM
2009
SIAM
331views Data Mining» more  SDM 2009»
15 years 6 months ago
Privacy Preservation in Social Networks with Sensitive Edge Weights.
With the development of emerging social networks, such as Facebook and MySpace, security and privacy threats arising from social network analysis bring a risk of disclosure of con...
Jie Wang, Jinze Liu, Jun Zhang, Lian Liu
SECON
2007
IEEE
15 years 3 months ago
Privacy Preserving Communication in MANETs
Abstract— Mobile ad hoc networks often support sensitive applications. These applications may require that users’ identity, location, and correspondents be kept secret. This is...
Heesook Choi, Patrick Drew McDaniel, Thomas F. La ...
DAMON
2006
Springer
15 years 1 months ago
Using secure coprocessors for privacy preserving collaborative data mining and analysis
Secure coprocessors have traditionally been used as a keystone of a security subsystem, eliminating the need to protect the rest of the subsystem with physical security measures. ...
Bishwaranjan Bhattacharjee, Naoki Abe, Kenneth Gol...
INFOCOM
2011
IEEE
14 years 27 days ago
Reconciling privacy preservation and intrusion detection in sensory data aggregation
—When wireless sensors are deployed to monitor the working or life conditions of people, the data collected and processed by these sensors may reveal privacy of people. The actua...
Chuang Wang, Guiling Wang, Wensheng Zhang 0001, Ta...
PKDD
2007
Springer
120views Data Mining» more  PKDD 2007»
15 years 3 months ago
Privacy Preserving Market Basket Data Analysis
Randomized Response techniques have been empirically investigated in privacy preserving association rule mining. However, previous research on privacy preserving market basket data...
Ling Guo, Songtao Guo, Xintao Wu