Sciweavers

770 search results - page 92 / 154
» Privacy Preserving Joins
Sort
View
INFOCOM
2009
IEEE
15 years 6 months ago
ACTION: Breaking the Privacy Barrier for RFID Systems
—In order to protect privacy, Radio Frequency Identification (RFID) systems employ Privacy-Preserving Authentication (PPA) to allow valid readers to explicitly authenticate their...
Li Lu, Jinsong Han, Renyi Xiao, Yunhao Liu
WPES
2005
ACM
15 years 5 months ago
Maintaining privacy on derived objects
Protecting privacy means to ensure users that access to their personal data complies with their preferences. However, information can be manipulated in order to derive new objects...
Nicola Zannone, Sushil Jajodia, Fabio Massacci, Du...
CASSIS
2005
Springer
15 years 5 months ago
The Architecture of a Privacy-Aware Access Control Decision Component
Today many interactions are carried out online through Web sites and e-services and often private and/or sensitive information is required by service providers. A growing concern r...
Claudio Agostino Ardagna, Marco Cremonini, Ernesto...
SIGMOD
2007
ACM
166views Database» more  SIGMOD 2007»
16 years 7 hour ago
Threats to privacy in the forensic analysis of database systems
The use of any modern computer system leaves unintended traces of expired data and remnants of users' past activities. In this paper, we investigate the unintended persistenc...
Patrick Stahlberg, Gerome Miklau, Brian Neil Levin...
CRYPTO
2006
Springer
149views Cryptology» more  CRYPTO 2006»
15 years 3 months ago
On Combining Privacy with Guaranteed Output Delivery in Secure Multiparty Computation
In the setting of multiparty computation, a set of parties wish to jointly compute a function of their inputs, while preserving security in the case that some subset of them are co...
Yuval Ishai, Eyal Kushilevitz, Yehuda Lindell, Ere...