Sciweavers

2217 search results - page 152 / 444
» A Data Privacy Taxonomy
Sort
View
170
Voted
COCO
2005
Springer
110views Algorithms» more  COCO 2005»
15 years 9 months ago
Prior Entanglement, Message Compression and Privacy in Quantum Communication
Consider a two-party quantum communication protocol for computing some function f : {0, 1}n × {0, 1}n → Z. We show that the first message of P can be compressed to O(k) classi...
Rahul Jain, Jaikumar Radhakrishnan, Pranab Sen
132
Voted
PET
2005
Springer
15 years 9 months ago
Privacy Vulnerabilities in Encrypted HTTP Streams
Abstract. Encrypting traffic does not prevent an attacker from performing some types of traffic analysis. We present a straightforward traffic analysis attack against encrypted HT...
George Dean Bissias, Marc Liberatore, David Jensen...
IEEEARES
2010
IEEE
15 years 9 months ago
Visualizing Past Personal Data Disclosures
—Today’s rich service offer in the World Wide Web increasingly requires the disclosure of personal user data. Service providers’ appetite for personal user data, however, is ...
Jan Kolter, Michael Netter, Günther Pernul
127
Voted
IKE
2010
15 years 1 months ago
Potential Application of Contextual Information Processing To Data Mining
Contextual processing is a new emerging field based on the notion that information surrounding an event lends new meaning to the interpretation of the event. Data mining is the pr...
Gregory Vert, Anitha Chennamaneni, S. Sitharama Iy...
139
Voted
KDD
2007
ACM
186views Data Mining» more  KDD 2007»
16 years 4 months ago
An Ad Omnia Approach to Defining and Achieving Private Data Analysis
We briefly survey several privacy compromises in published datasets, some historical and some on paper. An inspection of these suggests that the problem lies with the nature of the...
Cynthia Dwork