Sciweavers

8972 search results - page 28 / 1795
» Private Information Retrieval
Sort
View
FOCS
2008
IEEE
15 years 7 months ago
What Can We Learn Privately?
Learning problems form an important category of computational tasks that generalizes many of the computations researchers apply to large real-life data sets. We ask: what concept ...
Shiva Prasad Kasiviswanathan, Homin K. Lee, Kobbi ...
112
Voted
CHES
2006
Springer
131views Cryptology» more  CHES 2006»
15 years 4 months ago
Why One Should Also Secure RSA Public Key Elements
It is well known that a malicious adversary can try to retrieve secret information by inducing a fault during cryptographic operations. Following the work of Seifert on fault induc...
Eric Brier, Benoît Chevallier-Mames, Mathieu...
131
Voted
WWW
2009
ACM
16 years 1 months ago
To join or not to join: the illusion of privacy in social networks with mixed public and private user profiles
In order to address privacy concerns, many social media websites allow users to hide their personal profiles from the public. In this work, we show how an adversary can exploit an...
Elena Zheleva, Lise Getoor
92
Voted
STOC
2001
ACM
119views Algorithms» more  STOC 2001»
16 years 23 days ago
Private approximation of NP-hard functions
d Abstract] Shai Halevi Robert Krauthgamer Eyal Kushilevitz Kobbi Nissim ? The notion of private approximation was introduced recently by Feigenbaum, Fong, Strauss and Wright. Inf...
Shai Halevi, Robert Krauthgamer, Eyal Kushilevitz,...
126
Voted
IQIS
2005
ACM
15 years 6 months ago
Blocking-aware private record linkage
In this paper, the problem of quickly matching records (i.e., record linkage problem) from two autonomous sources without revealing privacy to the other parties is considered. In ...
Ali Al-Lawati, Dongwon Lee, Patrick McDaniel