Sciweavers

8972 search results - page 32 / 1795
» Private Information Retrieval
Sort
View
ICDT
2007
ACM
148views Database» more  ICDT 2007»
15 years 5 months ago
Ask a Better Question, Get a Better Answer A New Approach to Private Data Analysis
Cryptographic techniques for reasoning about information leakage have recently been brought to bear on the classical problem of statistical disclosure control – revealing accurat...
Cynthia Dwork
RIAO
1997
15 years 6 days ago
Coupling information retrieval and information extraction: A new text technology for gathering information from the web
The techniques of information retrieval and information extraction are complementary, but to date there has been little concrete work aimed at integrating the two. We describe how...
Robert J. Gaizauskas, Alexander M. Robertson
81
Voted
ICDM
2007
IEEE
135views Data Mining» more  ICDM 2007»
15 years 5 months ago
Private Inference Control for Aggregate Database Queries
Data security is a critical issue for many organizations. Sensitive data must be protected from both inside and outside attackers. Access control policies and related mechanisms h...
Geetha Jagannathan, Rebecca N. Wright
FC
2005
Springer
120views Cryptology» more  FC 2005»
15 years 4 months ago
Achieving Fairness in Private Contract Negotiation
Abstract. Suppose Alice and Bob are two entities (e.g. agents, organizations, etc.) that wish to negotiate a contract. A contract consists of several clauses, and each party has ce...
Keith B. Frikken, Mikhail J. Atallah
80
Voted
FC
2003
Springer
101views Cryptology» more  FC 2003»
15 years 4 months ago
Fully Private Auctions in a Constant Number of Rounds
Abstract. We present a new cryptographic auction protocol that prevents extraction of bid information despite any collusion of participants. This requirement is stronger than commo...
Felix Brandt