Sciweavers

1551 search results - page 13 / 156
» Privacy-Preserving Network Aggregation
Sort
View
142 views 125 votes 15 years 7 months ago  ICDCSW 2002»
The proliferation of smart gadgets, appliances, mobile devices, PDAs and sensors has enabled the construction of ubiquitous computing environments, transforming regular physical s...
173 views 208 votes 16 years 3 months ago  GIS 2008»
In order to provide context?aware Location?Based Services, real location data of mobile users must be collected and analyzed by spatio?temporal data mining methods. However, the d...
191 views 139 votes 15 years 8 months ago  WOWMOM 2006»
: Nowadays many organisations share sensitive services through open network systems and this raises the need for an authorization framework that can interoperate even when the part...
126 views 132 votes 15 years 1 months ago  IEEESP 2010»
The need for controlled sharing of sensitive information occurs in many realistic everyday scenarios, ranging from critical (e.g., national security) to mundane (e.g., social netw...
166 views 127 votes 14 years 9 months ago  TDP 2010»
The ability to store vast quantities of data and the emergence of high speed networking have led to intense interest in distributed data mining. However, privacy concerns, as well ...
183 views 134 votes 15 years 9 months ago  CCS 2007»
Human Desoxyribo-Nucleic Acid (DNA) sequences offer a wealth of information that reveal, among others, predisposition to various diseases and paternity relations. The breadth and...
161 views 238 votes 16 years 4 months ago  ICDE 2008»
Recently, as more and more social network data has been published in one way or another, preserving privacy in publishing social network data becomes an important concern. With som...
176 views 116 votes 15 years 9 months ago  ICDE 2006»
Several randomized techniques have been proposed for privacy preserving data mining of continuous data. These approaches generally attempt to hide the sensitive data by randomly m...
148 views 127 votes 15 years 1 months ago  MONET 2010»
It is well recognized that security is vital for reliable operation of vehicular ad-hoc networks (VANETs). Location privacy is one of the main security challenges in VANETs, which ...
139 views 121 votes 15 years 9 months ago  DAWAK 2007»
We propose a privacy-preserving protocol for computing aggregation queries over the join of private tables. In this problem, several parties wish to share aggregated information ov...