Sciweavers

129 search results - page 19 / 26
» Symmetrically Private Information Retrieval
Sort
View
SIGMOD
2012
ACM
220views Database» more  SIGMOD 2012»
13 years 2 months ago
GUPT: privacy preserving data analysis made easy
It is often highly valuable for organizations to have their data analyzed by external agents. However, any program that computes on potentially sensitive data risks leaking inform...
Prashanth Mohan, Abhradeep Thakurta, Elaine Shi, D...
98
Voted
HICSS
1999
IEEE
153views Biometrics» more  HICSS 1999»
15 years 4 months ago
Search Patterns in Hypertext Exhibits
As access to hypermedia documents becomes generally available, it becomes increasingly important to understand how casual users search for information. We have studied search patt...
Joan C. Nordbotten, Svein Nordbotten
ASIACRYPT
2010
Springer
14 years 10 months ago
Structured Encryption and Controlled Disclosure
We consider the problem of encrypting structured data (e.g., a web graph or a social network) in such a way that it can be efficiently and privately queried. For this purpose, we ...
Melissa Chase, Seny Kamara
96
Voted
SAC
2005
ACM
15 years 6 months ago
Privacy preserving learning in negotiation
Machine learning techniques are widely used in negotiation systems. To get more accurate and satisfactory learning results, negotiation parties have the desire to employ learning ...
Sheng Zhang, Fillia Makedon
CAISE
2007
Springer
15 years 6 months ago
Personalizing PageRank-Based Ranking over Distributed Collections
In distributed work environments, where users are sharing and searching resources, ensuring an appropriate ranking at remote peers is a key problem. While this issue has been inves...
Stefania Costache, Wolfgang Nejdl, Raluca Paiu