Sciweavers

132 search results - page 2 / 27
» Privacy-Preserving Trust Negotiations
Sort
View
USS
2008
13 years 8 months ago
Privacy-Preserving Location Tracking of Lost or Stolen Devices: Cryptographic Techniques and Replacing Trusted Third Parties wit
We tackle the problem of building privacy-preserving device-tracking systems -- or private methods to assist in the recovery of lost or stolen Internet-connected mobile devices. T...
Thomas Ristenpart, Gabriel Maganis, Arvind Krishna...
CORR
2011
Springer
178views Education» more  CORR 2011»
13 years 1 months ago
Enabling Multi-level Trust in Privacy Preserving Data Mining
Yaping Li, Minghua Chen, Qiwei Li, Wei Zhang
ACSW
2006
13 years 7 months ago
Improving resource utilisation in market oriented grid management and scheduling
Service providers of the future could dynamically negotiate for, and create their infrastructure on Grid based utility computing and communication providers. Such commercialisatio...
Kris Bubendorfer
BPM
2007
Springer
118views Business» more  BPM 2007»
14 years 13 days ago
Privacy Preserving Collaborative Business Process Management
The basic objective of collaborative supply chain planning (CSCP) is to fulfill the demand of the customers by integrating a network of organizations through mediums such as intern...
Sumit Chakraborty, Asim Kumar Pal
NDSS
2009
IEEE
14 years 1 months ago
Two-Party Computation Model for Privacy-Preserving Queries over Distributed Databases
Many existing privacy-preserving techniques for querying distributed databases of sensitive information do not scale for large databases due to the use of heavyweight cryptographi...
Sherman S. M. Chow, Jie-Han Lee, Lakshminarayanan ...