Sciweavers

251 search results - page 13 / 51
» Privacy and HCI: methodologies for studying privacy issues
Sort
View
ICNP
2007
IEEE
15 years 3 months ago
Location Privacy in Sensor Networks Against a Global Eavesdropper
— While many protocols for sensor network security provide confidentiality for the content of messages, contextual information usually remains exposed. Such information can be c...
K. Mehta, Donggang Liu, Matthew Wright
ISDA
2008
IEEE
15 years 3 months ago
Novel Algorithms for Privacy Preserving Utility Mining
Privacy Preserving Data Mining (PPDM) has become a popular topic in the research community. How to strike a balance between privacy protection and knowledge discovery in the shari...
Jieh-Shan Yeh, Po-Chiang Hsu, Ming-Hsun Wen
79
Voted
TARK
2005
Springer
15 years 3 months ago
Unconditional privacy in social choice
The aggregation of conflicting preferences is an important issue in human society and multiagent systems. Due to its universality, voting among a set of alternatives has a centra...
Felix Brandt, Tuomas Sandholm
ICDE
2005
IEEE
183views Database» more  ICDE 2005»
15 years 3 months ago
Protection of Location Privacy using Dummies for Location-based Services
Recently, highly accurate positioning devices enable us to provide various types of location-based services. On the other hand, because position data obtained by such devices incl...
Hidetoshi Kido, Yutaka Yanagisawa, Tetsuji Satoh
CIKM
2007
Springer
15 years 3 months ago
"I know what you did last summer": query logs and user privacy
We investigate the subtle cues to user identity that may be exploited in attacks on the privacy of users in web search query logs. We study the application of simple classifiers ...
Rosie Jones, Ravi Kumar, Bo Pang, Andrew Tomkins