Sciweavers

3395 search results - page 31 / 679
» Computational Differential Privacy
Sort
View
ESORICS
2008
Springer
13 years 11 months ago
Sharemind: A Framework for Fast Privacy-Preserving Computations
Gathering and processing sensitive data is a difficult task. In fact, there is no common recipe for building the necessary information systems. In this paper, we present a provably...
Dan Bogdanov, Sven Laur, Jan Willemson
FC
2009
Springer
150views Cryptology» more  FC 2009»
14 years 4 months ago
Privacy-Preserving Information Markets for Computing Statistical Data
Abstract. Consider an “information market” where private and potentially sensitive data are collected, treated as commodity and processed into aggregated information with comme...
Aggelos Kiayias, Bülent Yener, Moti Yung
ICDCSW
2002
IEEE
14 years 2 months ago
A Flexible, Privacy-Preserving Authentication Framework for Ubiquitous Computing Environments
The proliferation of smart gadgets, appliances, mobile devices, PDAs and sensors has enabled the construction of ubiquitous computing environments, transforming regular physical s...
Jalal Al-Muhtadi, Anand Ranganathan, Roy H. Campbe...
INTERACT
1997
13 years 11 months ago
Eigen-Space Coding as a Means to Support Privacy in Computer Mediated Communication
The current solutions to disclosing privacy in computer-mediated communication are two-fold: either the connection is permitted and an audio-video link is opened providing a full-b...
Joëlle Coutaz, James L. Crowley, Franç...
PODC
2010
ACM
14 years 1 months ago
Hybrid-secure MPC: trading information-theoretic robustness for computational privacy
Most protocols for distributed, fault-tolerant computation, or multi-party computation (MPC), provide security guarantees in an all-or-nothing fashion: If the number of corrupted p...
Christoph Lucas, Dominik Raub, Ueli M. Maurer