Sciweavers

1064 search results - page 142 / 213
» Cryptography from Anonymity
Sort
View
CHI
2005
ACM
14 years 9 months ago
Giving the caller the finger: collaborative responsibility for cellphone interruptions
We present a system in which a cell phone decides whether to ring by accepting votes from the others in a conversation with the called party. When a call comes in, the phone first...
Stefan Marti, Chris Schmandt
SIGMOD
2006
ACM
125views Database» more  SIGMOD 2006»
14 years 9 months ago
Personalized privacy preservation
We study generalization for preserving privacy in publication of sensitive data. The existing methods focus on a universal approach that exerts the same amount of preservation for...
Xiaokui Xiao, Yufei Tao
SIGMOD
2005
ACM
97views Database» more  SIGMOD 2005»
14 years 9 months ago
Incognito: Efficient Full-Domain K-Anonymity
A number of organizations publish microdata for purposes such as public health and demographic research. Although attributes that clearly identify individuals, such as Name and So...
Kristen LeFevre, David J. DeWitt, Raghu Ramakrishn...
CSE
2009
IEEE
14 years 4 months ago
Social Inference Risk Modeling in Mobile and Social Applications
— The emphasis of emerging mobile and Web 2.0 applications on collaboration and communication increases threats to user privacy. A serious, yet under-researched privacy risk resu...
Sara Motahari, Sotirios G. Ziavras, Mor Naaman, Mo...
ICDM
2009
IEEE
143views Data Mining» more  ICDM 2009»
14 years 4 months ago
An Attack on the Privacy of Sanitized Data that Fuses the Outputs of Multiple Data Miners
Abstract—Data sanitization has been used to restrict reidentification of individuals and disclosure of sensitive information from published data. We propose an attack on the pri...
Michal Sramka, Reihaneh Safavi-Naini, Jörg De...