Sciweavers

112 search results - page 7 / 23
» Privacy-Preserving Queries on Encrypted Data
Sort
View
ESORICS
2005
Springer
15 years 3 months ago
Privacy Preserving Clustering
The freedom and transparency of information flow on the Internet has heightened concerns of privacy. Given a set of data items, clustering algorithms group similar items together...
Somesh Jha, Louis Kruger, Patrick McDaniel
ICISC
2009
184views Cryptology» more  ICISC 2009»
14 years 7 months ago
Efficient Privacy-Preserving Face Recognition
Abstract. Automatic recognition of human faces is becoming increasingly popular in civilian and law enforcement applications that require reliable recognition of humans. However, t...
Ahmad-Reza Sadeghi, Thomas Schneider 0003, Immo We...
ICDE
2006
IEEE
165views Database» more  ICDE 2006»
15 years 3 months ago
Privacy Preserving Clustering on Horizontally Partitioned Data
Data mining has been a popular research area for more than a decade due to its vast spectrum of applications. The power of data mining tools to extract hidden information that can...
Ali Inan, Yücel Saygin, Erkay Savas, Ay&ccedi...
PDCAT
2007
Springer
15 years 3 months ago
Privacy Preserving Set Intersection Protocol Secure against Malicious Behaviors
When datasets are distributed on different sources, finding out their intersection while preserving the privacy of the datasets is a widely required task. In this paper, we addre...
Yingpeng Sang, Hong Shen
CRYPTO
2004
Springer
91views Cryptology» more  CRYPTO 2004»
15 years 2 months ago
Privacy-Preserving Datamining on Vertically Partitioned Databases
In a recent paper Dinur and Nissim considered a statistical database in which a trusted database administrator monitors queries and introduces noise to the responses with the goal ...
Cynthia Dwork, Kobbi Nissim