Sciweavers

2958 search results - page 12 / 592
» Using Anonymized Data for Classification
Sort
View
118
Voted
RTCSA
2007
IEEE
15 years 6 months ago
A Privacy Preserving Access Control Scheme using Anonymous Identification for Ubiquitous Environments
Compared to all emerging issues, privacy is probably the most prominent concern when it comes to judging the effects of a wide spread deployment of ubiquitous computing. On one ha...
Nguyen Ngoc Diep, Sungyoung Lee, Young-Koo Lee, He...
TDP
2010
140views more  TDP 2010»
14 years 7 months ago
Movement Data Anonymity through Generalization
In recent years, spatio-temporal and moving objects databases have gained considerable interest, due to the diffusion of mobile devices (e.g., mobile phones, RFID devices and GPS ...
Anna Monreale, Gennady L. Andrienko, Natalia V. An...
87
Voted
TKDE
2011
472views more  TKDE 2011»
14 years 7 months ago
Anonymous Publication of Sensitive Transactional Data
Abstract—Existing research on privacy-preserving data publishing focuses on relational data: in this context, the objective is to enforce privacy-preserving paradigms, such as k-...
Gabriel Ghinita, Panos Kalnis, Yufei Tao
95
Voted
SIGCOMM
2009
ACM
15 years 7 months ago
PathForge: faithful anonymization of movement data
For most mobile networks, providers need the current position of their users to provide efficient service. The resulting motion data is not only an invaluable source for analyzing...
Sebastian Kay Belle, Marcel Waldvogel, Oliver Haas...
96
Voted
WPES
2003
ACM
15 years 5 months ago
Reusable anonymous return channels
Mix networks are used to deliver messages anonymously to recipients, but do not straightforwardly allow the recipient of an anonymous message to reply to its sender. Yet the abili...
Philippe Golle, Markus Jakobsson