Sciweavers

1551 search results - page 1 / 156
» Privacy-Preserving Network Aggregation
Sort
View
128 views 131 votes 15 years 7 months ago  PAKDD 2010»
Abstract. Consider the scenario where information about a large network is distributed across several different parties or commercial entities. Intuitively, we would expect that th...
203 views 113 votes 15 years 9 months ago  INFOCOM 2007»
Abstract— Providing efficient data aggregation while preserving data privacy is a challenging problem in wireless sensor networks research. In this paper, we present two privacy...
162 views 145 votes 15 years 19 days ago  USS 2010»
Secure multiparty computation (MPC) allows joint privacy-preserving computations on data of multiple parties. Although MPC has been studied substantially, building solutions that ...
1105 views 161 votes 14 years 9 months ago  TMC 2011»
—Monitoring personal locations with a potentially untrusted server poses privacy threats to the monitored individuals. To this end, we propose a privacy-preserving location monit...
224 views 161 votes 14 years 6 months ago  INFOCOM 2011»
—When wireless sensors are deployed to monitor the working or life conditions of people, the data collected and processed by these sensors may reveal privacy of people. The actua...
146 views 129 votes 16 years 2 months ago  PERCOM 2008»
This paper presents preliminary results on anonymization and obfuscation techniques to preserve users' privacy in context-aware service provisioning. The techniques are based...
105 views 116 votes 15 years 8 months ago  IPTPS 2004»
Abstract— Content sharing is a popular usage of peerto-peer systems for its inherent scalability and low cost of maintenance. In this paper, we leverage this nature of peer-to-pe...
141 views 127 votes 15 years 8 months ago  NDSS 2005»
— Content sharing is a popular use of peer-to-peer systems because of their inherent scalability and low cost of maintenance. In this paper, we leverage this nature of peer-topee...
128 views 123 votes 15 years 9 months ago  CIDM 2007»
— In this paper, we consider burst detection within the context of privacy. In our scenario, multiple parties want to detect a burst in aggregated time series data, but none of t...
137 views 193 votes 16 years 3 months ago  SIGMOD 2009»
Many websites provide form-like interfaces which allow users to execute search queries on the underlying hidden databases. In this paper, we explain the importance of protecting s...