Sciweavers

1551 search results - page 4 / 156
» Privacy-Preserving Network Aggregation
Sort
View
318 views 161 votes 13 years 5 months ago  INFOCOM 2012»
—Collaborative spectrum sensing has been regarded as a promising approach to enable secondary users to detect primary users by exploiting spatial diversity. In this paper, we con...
277 views 242 votes 13 years 5 months ago  PET 2012»
We present PRISM, a privacy-preserving scheme for word search in cloud computing. In the face of a curious cloud provider, the main challenge is to design a scheme that achieves pr...
194 views 116 votes 14 years 9 months ago  PPNA 2011»
105 views 91 votes 15 years 9 months ago  AINA 2007»
128 views 203 votes 16 years 2 months ago  SIGMOD 2005»
We present techniques for privacy-preserving computation of multidimensional aggregates on data partitioned across multiple clients. Data from different clients is perturbed (rand...
213 views 153 votes 13 years 5 months ago  PET 2012»
Real-time statistics on smart meter consumption data must preserve consumer privacy and tolerate smart meter failures. Existing protocols for this private distributed aggregation m...
156 views 140 votes 16 years 2 months ago  PODS 2003»
There has been increasing interest in the problem of building accurate data mining models over aggregate data, while protecting privacy at the level of individual records. One app...
150 views 144 votes 15 years 9 months ago  FC 2009»
Abstract. Consider an “information market” where private and potentially sensitive data are collected, treated as commodity and processed into aggregated information with comme...
177 views 135 votes 15 years 4 months ago  SDM 2008»
In this paper we explore private computation built on vector addition and its applications in privacypreserving data mining. Vector addition is a surprisingly general tool for imp...
169 views 133 votes 15 years 9 months ago  CANS 2009»
As social networks sites continue to proliferate and are being used for an increasing variety of purposes, the privacy risks raised by the full access of social networking sites ov...