Sciweavers

1551 search results - page 7 / 156
» Privacy-Preserving Network Aggregation
Sort
View
115 views 108 votes 15 years 8 months ago  ICEBE 2006»
Privacy has been recognized as a very important issue in electronic commerce. However, many privacy techniques were not adopted and many online anonymity services failed. In this ...
383 views 185 votes 15 years 8 months ago  ISMIS 2005»
Abstract. Testing of database applications is of great importance. Although various studies have been conducted to investigate testing techniques for database design, relatively fe...
138 views 136 votes 15 years 8 months ago  SDMW 2004»
The recent investigation of privacy-preserving data mining and other kinds of privacy-preserving distributed computation has been motivated by the growing concern about the privacy...
179 views 139 votes 15 years 2 months ago  PERVASIVE 2008»
Opportunistic sensing allows applications to "task" mobile devices to measure context in a target region. For example, one could leverage sensorequipped vehicles to measu...
148 views 130 votes 16 years 2 months ago  PODS 2001»
The increasing ability to track and collect large amounts of data with the use of current hardware technology has lead to an interest in the development of data mining algorithms ...
190 views 127 votes 15 years 9 months ago  INFOCOM 2009»
— Privacy threat is one of the critical issues in network coding, where attacks such as traffic analysis can be easily launched by a malicious adversary once enough encoded packe...
172 views 127 votes 15 years 8 months ago  EDBT 2010»
User privacy in location-based services has attracted great interest in the research community. We introduce a novel framework based on a decentralized architecture for privacy pr...
131 views 105 votes 15 years 9 months ago  ESORICS 2009»
The proliferation of mobile devices has given rise to novel user-centric applications and services. In current mobile systems, users gain access to remote servers over mobile netwo...
150 views 140 votes 15 years 8 months ago  LCN 2006»
Vehicular networks will become an important component for information accesses in one’s daily life. A vehicular network provides a vehicular user not only chances to communicate...
204 views 113 votes 16 years 3 months ago  ESORICS 2009»
Abstract. Recent years have seen unprecedented growth in the popularity of social network systems, with Facebook being an archetypical example. The access control paradigm behind t...