Sciweavers

3395 search results - page 36 / 679
» Computational Differential Privacy
Sort
View
ICISC
2007
134views Cryptology» more  ICISC 2007»
13 years 11 months ago
A Lightweight Privacy Preserving Authentication and Access Control Scheme for Ubiquitous Computing Environment
In Ubiquitous Computing Environment (UCE), service provider wants to provide its service to only legitimate users. Some users who belong to same service provider do not want to rev...
Jangseong Kim, Zeen Kim, Kwangjo Kim
SDM
2008
SIAM
177views Data Mining» more  SDM 2008»
13 years 11 months ago
Practical Private Computation and Zero-Knowledge Tools for Privacy-Preserving Distributed Data Mining
In this paper we explore private computation built on vector addition and its applications in privacypreserving data mining. Vector addition is a surprisingly general tool for imp...
Yitao Duan, John F. Canny
DEXAW
2002
IEEE
84views Database» more  DEXAW 2002»
14 years 2 months ago
Privacy of Trust in Similarity Estimation through Secure Computations
Javier Carbo Rubiera, José M. Molina L&oacu...
CACM
2005
64views more  CACM 2005»
13 years 9 months ago
Privacy and trust issues with invisible computers
Saadi Lahlou, Marc Langheinrich, Carsten Röck...