Sciweavers

234 search results - page 40 / 47
» Data collection with self-enforcing privacy
Sort
View
ACSAC
2000
IEEE
14 years 2 months ago
A Novel Approach to On-Line Status Authentication of Public-Key Certificates
The widespread use of public networks, such as the Internet, for the exchange of sensitive data, like legally valid documents and business transactions, poses severe security cons...
Eugenio Faldella, Marco Prandini
ISI
2004
Springer
14 years 3 months ago
A Tool for Internet Chatroom Surveillance
Internet chatrooms are common means of interaction and communications, and they carry valuable information about formal or ad-hoc formation of groups with diverse objectives. This ...
Seyit Ahmet Çamtepe, Mukkai S. Krishnamoort...
SAC
2006
ACM
14 years 3 months ago
Privacy-preserving SVM using nonlinear kernels on horizontally partitioned data
Traditional Data Mining and Knowledge Discovery algorithms assume free access to data, either at a centralized location or in federated form. Increasingly, privacy and security co...
Hwanjo Yu, Xiaoqian Jiang, Jaideep Vaidya
WISEC
2010
ACM
14 years 3 months ago
Privacy-preserving computation of benchmarks on item-level data using RFID
Currently, companies are about to optimize their internal processes by monitoring items they handle with Radio Frequency Identification (RFID). However, there is a risk that sens...
Florian Kerschbaum, Nina Oertel, Leonardo Weiss Fe...
CHI
2008
ACM
14 years 10 months ago
Ingimp: introducing instrumentation to an end-user open source application
Open source projects are gradually incorporating usability methods into their development practices, but there are still many unmet needs. One particular need for nearly any open ...
Michael Terry, Matthew Kay, Brad Van Vugt, Brandon...