Sciweavers

3395 search results - page 33 / 679
» Computational Differential Privacy
Sort
View
HICSS
2009
IEEE
144views Biometrics» more  HICSS 2009»
14 years 4 months ago
Identity Inference as a Privacy Risk in Computer-Mediated Communication
New Web 2.0 applications, with their emphasis on collaboration and communication, hold the promise of major advances in social connectivity and coordination; however, they also in...
Sara Motahari, Sotirios G. Ziavras, Richard P. Sch...
SRDS
2010
IEEE
13 years 7 months ago
An Entity-Centric Approach for Privacy and Identity Management in Cloud Computing
Entities (e.g., users, services) have to authenticate themselves to service providers (SPs) in order to use their services. An entity provides personally identifiable information (...
Pelin Angin, Bharat K. Bhargava, Rohit Ranchal, No...
ECSCW
1993
13 years 11 months ago
Design for Privacy in Ubiquitous Computing Environments
Abstract: Current developments in information technology are leading to increasing capture and storage of information about people and their activities. This raises serious issues ...
Victoria Bellotti, Abigail Sellen
CORR
2010
Springer
144views Education» more  CORR 2010»
13 years 10 months ago
Privacy-Preserving Protocols for Eigenvector Computation
Abstract. In this paper, we present a protocol for computing the principal eigenvector of a collection of data matrices belonging to multiple semi-honest parties with privacy const...
Manas A. Pathak, Bhiksha Raj
CRYPTO
2006
Springer
149views Cryptology» more  CRYPTO 2006»
14 years 1 months ago
On Combining Privacy with Guaranteed Output Delivery in Secure Multiparty Computation
In the setting of multiparty computation, a set of parties wish to jointly compute a function of their inputs, while preserving security in the case that some subset of them are co...
Yuval Ishai, Eyal Kushilevitz, Yehuda Lindell, Ere...