Sciweavers

129 search results - page 9 / 26
» Symmetrically Private Information Retrieval
Sort
View
81
Voted
SAGT
2009
Springer
108views Game Theory» more  SAGT 2009»
15 years 7 months ago
On the Planner's Loss Due to Lack of Information in Bayesian Mechanism Design
In this paper we study a large class of resource allocation problems with an important complication, the utilization cost of a given resource is private information of a profit ma...
José R. Correa, Nicolas Figueroa
193
Voted
SIGMOD
2007
ACM
144views Database» more  SIGMOD 2007»
16 years 16 days ago
GhostDB: querying visible and hidden data without leaks
Imagine that you have been entrusted with private data, such as corporate product information, sensitive government information, or symptom and treatment information about hospita...
Nicolas Anciaux, Mehdi Benzine, Luc Bouganim, Phil...
SIGMOD
2012
ACM
223views Database» more  SIGMOD 2012»
13 years 2 months ago
MaskIt: privately releasing user context streams for personalized mobile applications
The rise of smartphones equipped with various sensors has enabled personalization of various applications based on user contexts extracted from sensor readings. At the same time i...
Michaela Götz, Suman Nath, Johannes Gehrke
101
Voted
NDSS
1999
IEEE
15 years 4 months ago
Secure Password-Based Protocol for Downloading a Private Key
We present protocols that allow a user Alice, knowing only her name and password, and not carrying a smart card, to "log in to the network" from a "generic" wo...
Radia J. Perlman, Charlie Kaufman
108
Voted
SIGIR
2009
ACM
15 years 6 months ago
Link analysis for private weighted graphs
Link analysis methods have been used successfully for knowledge discovery from the link structure of mutually linking entities. Existing link analysis methods have been inherently...
Jun Sakuma, Shigenobu Kobayashi