Sciweavers

251 search results - page 42 / 51
» Privacy and HCI: methodologies for studying privacy issues
Sort
View
SIGKDD
2010
159views more  SIGKDD 2010»
14 years 8 months ago
Providing K-Anonymity in location based services
The offering of anonymity in relational databases has attracted a great deal of attention in the database community during the last decade [4]. Among the different solution appr...
Aris Gkoulalas-Divanis, Panos Kalnis, Vassilios S....
161
Voted
SIGMOD
2008
ACM
89views Database» more  SIGMOD 2008»
15 years 9 months ago
Towards identity anonymization on graphs
The proliferation of network data in various application domains has raised privacy concerns for the individuals involved. Recent studies show that simply removing the identities ...
Kun Liu, Evimaria Terzi
IACR
2011
73views more  IACR 2011»
13 years 9 months ago
Secure Authentication from a Weak Key, Without Leaking Information
We study the problem of authentication based on a weak key in the information-theoretic setting. A key is weak if its min-entropy is an arbitrary small fraction of its bit length. ...
Niek J. Bouman, Serge Fehr
PERVASIVE
2006
Springer
14 years 9 months ago
"Need to Know": Examining Information Need in Location Discourse
Location discourse involves the active or passive sharing of location information between individuals. Related applications include mobile friend locators, and location-dependent m...
Derek F. Reilly, David Dearman, Vicki Ha, Ian Smit...
IJMI
2007
134views more  IJMI 2007»
14 years 9 months ago
Investigating risk exposure in e-health systems
: The increasing dependency being placed on electronic health information systems presents new challenges for today’s health managers and systems developers. This paper uses Elec...
Peter R. Croll, Jasmine Croll