Sciweavers

3395 search results - page 598 / 679
» Computational Differential Privacy
Sort
View
145
Voted
HUC
2010
Springer
15 years 4 months ago
Throw your photos: an intuitive approach for sharing between mobile phones and interactive tables
Many approaches have been proposed to connect mobile phones with interactive tables. Most rely on having the phone placed on table all times, which may hinder the overall user exp...
Fadi Chehimi, Enrico Rukzio
117
Voted
CSSE
2006
IEEE
15 years 3 months ago
Experimental analysis of a privacy-preserving scalar product protocol
The recent investigation of privacy-preserving data mining has been motivated by the growing concern about the privacy of individuals when their data is stored, aggregated, and mi...
Zhiqiang Yang, Rebecca N. Wright, Hiranmayee Subra...
IJWIN
2006
119views more  IJWIN 2006»
15 years 3 months ago
Querying in Packs: Trustworthy Data Management in Ad Hoc Networks
We describe a trust-based data management framework enabling mobile devices to access the distributed computation, storage, and sensory resources available in pervasive computing ...
Anand Patwardhan, Filip Perich, Anupam Joshi, Tim ...
133
Voted
PERCOM
2008
ACM
15 years 3 months ago
Randomized Bit Encoding for Stronger Backward Channel Protection in RFID Systems
In this paper, we introduce a randomized bit encoding scheme that can strengthen the privacy protection on RFID tags. This scheme is used together with the backward channel protec...
Tong-Lee Lim, Tieyan Li, Sze-Ling Yeo
125
Voted
PERVASIVE
2006
Springer
15 years 3 months ago
"Need to Know": Examining Information Need in Location Discourse
Location discourse involves the active or passive sharing of location information between individuals. Related applications include mobile friend locators, and location-dependent m...
Derek F. Reilly, David Dearman, Vicki Ha, Ian Smit...