Sciweavers

1005 search results - page 89 / 201
» Privacy Preserving Clustering
Sort
View
NETWORKING
2007
15 years 7 months ago
Privacy-Aware Multi-Context RFID Infrastructure Using Public Key Cryptography
We propose a novel approach in designing an RFID infrastructure which foresees the usage of a single RFID tag within different contexts and for multiple purposes. We regard privacy...
Selim Volkan Kaya, Erkay Savas, Albert Levi, Ö...
ICDE
2008
IEEE
125views Database» more  ICDE 2008»
15 years 12 months ago
On breaching enterprise data privacy through adversarial information fusion
— Data privacy is one of the key challenges faced by enterprises today. Anonymization techniques address this problem by sanitizing sensitive data such that individual privacy is...
Srivatsava Ranjit Ganta, Raj Acharya
COLCOM
2007
IEEE
15 years 12 months ago
Privacy protection on sliding window of data streams
—In many applications, transaction data arrive in the form of high speed data streams. These data contain a lot of information about customers that needs to be carefully managed ...
Weiping Wang 0001, Jianzhong Li, Chunyu Ai, Yingsh...
PUC
2008
117views more  PUC 2008»
15 years 5 months ago
Designing for privacy and self-presentation in social awareness
Social awareness applications are based on the idea of a group sharing real-time context information via personal and ubiquitous terminals. Studies of such applications have shown ...
Mika Raento, Antti Oulasvirta
PERCOM
2009
ACM
16 years 9 days ago
Towards Privacy-Sensitive Participatory Sensing
—The ubiquity of mobile devices has brought forth the concept of participatory sensing, whereby ordinary citizens can now contribute and share information from the urban environm...
Kuan Lun Huang, Salil S. Kanhere, Wen Hu