Sciweavers

1005 search results - page 87 / 201
» Privacy Preserving Clustering
Sort
View
SECON
2007
IEEE
15 years 7 months ago
Query privacy in wireless sensor networks
— Existing mechanisms for querying wireless sensor networks leak client interests to the servers performing the queries. The leaks are not only in terms of specific regions but ...
Bogdan Carbunar, Yang Yu, Weidong Shi, Michael Pea...
WOWMOM
2005
ACM
133views Multimedia» more  WOWMOM 2005»
15 years 6 months ago
A Statistical Matching Approach to Detect Privacy Violation for Trust-Based Collaborations
Distributed trust and reputation management mechanisms are often proposed as a means of providing assurance in dynamic and open environments by enabling principals to building up ...
Mohamed Ahmed, Daniele Quercia, Stephen Hailes
PVLDB
2010
121views more  PVLDB 2010»
14 years 11 months ago
Personalized Privacy Protection in Social Networks
Due to the popularity of social networks, many proposals have been proposed to protect the privacy of the networks. All these works assume that the attacks use the same background...
Mingxuan Yuan, Lei Chen 0002, Philip S. Yu
FOCS
2010
IEEE
14 years 11 months ago
The Limits of Two-Party Differential Privacy
We study differential privacy in a distributed setting where two parties would like to perform analysis of their joint data while preserving privacy for both datasets. Our results ...
Andrew McGregor, Ilya Mironov, Toniann Pitassi, Om...
ATAL
2007
Springer
15 years 7 months ago
SSDPOP: improving the privacy of DCOP with secret sharing
Multi-agent systems designed to work collaboratively with groups of people typically require private information that people will entrust to them only if they have assurance that ...
Rachel Greenstadt, Barbara J. Grosz, Michael D. Sm...