Sciweavers

2454 search results - page 63 / 491
» Privacy in the Information and Communications Technologies
Sort
View
SP
2007
IEEE
102views Security Privacy» more  SP 2007»
15 years 4 months ago
Improving the Robustness of Private Information Retrieval
Since 1995, much work has been done creating protocols for private information retrieval (PIR). Many variants of the basic PIR model have been proposed, including such modificati...
Ian Goldberg
ACSAC
2003
IEEE
15 years 3 months ago
Honeypots: Catching the Insider Threat
In the past several years there has been extensive research into honeypot technologies, primarily for detection and information gathering against external threats. However, little...
Lance Spitzner
SEMWEB
2007
Springer
15 years 3 months ago
Recommendation Privacy Protection in Trust-based Knowledge Sharing Network
Trust can be applied to knowledge sharing on a distributed network of knowledge source agents. Each agent represents a person who trusts some other agents. Based on these trust-rel...
Weisen Guo, Steven B. Kraines
EDBT
2008
ACM
144views Database» more  EDBT 2008»
15 years 10 months ago
Protecting privacy in recorded conversations
Professionals in the field of speech technology are often constrained by a lack of speech corpora that are important to their research and development activities. These corpora ex...
Scot Cunningham, Traian Marius Truta
ICISC
2009
184views Cryptology» more  ICISC 2009»
14 years 7 months ago
Efficient Privacy-Preserving Face Recognition
Abstract. Automatic recognition of human faces is becoming increasingly popular in civilian and law enforcement applications that require reliable recognition of humans. However, t...
Ahmad-Reza Sadeghi, Thomas Schneider 0003, Immo We...