Sciweavers

340 search results - page 30 / 68
» Computationally Private Information Retrieval with Polylogar...
Sort
View
KDD
2010
ACM
203views Data Mining» more  KDD 2010»
13 years 10 months ago
Collusion-resistant privacy-preserving data mining
Recent research in privacy-preserving data mining (PPDM) has become increasingly popular due to the wide application of data mining and the increased concern regarding the protect...
Bin Yang, Hiroshi Nakagawa, Issei Sato, Jun Sakuma
MOBISYS
2007
ACM
14 years 6 months ago
Preserving location privacy in wireless lans
The broadcast and tetherless nature of wireless networks and the widespread deployment of Wi-Fi hotspots makes it easy to remotely locate a user by observing her wireless signals....
Tao Jiang, Helen J. Wang, Yih-Chun Hu
GROUP
2005
ACM
14 years 10 days ago
A survey of collaborative information seeking practices of academic researchers
Information seeking and management practices are an integral aspect of people’s daily work. However, we still have little understanding of collaboration in the information seeki...
Patricia Ruma Spence, Madhu C. Reddy, Richard Hall
CSE
2009
IEEE
14 years 1 months ago
Noise Injection for Search Privacy Protection
Abstract—Extensive work has been devoted to private information retrieval and privacy preserving data mining. To protect user privacy from search engines, however, most current a...
Shaozhi Ye, Shyhtsun Felix Wu, Raju Pandey, Hao Ch...
SAC
2009
ACM
14 years 1 months ago
Secure web-based retrieval of documents with usage controls
Usage controls enable the provider of some information to limit how recipients may use it. Usage controls may be desirable in enterprise environments, e.g., for regulatory complia...
Peter Djalaliev, José Carlos Brustoloni