Sciweavers

219 search results - page 11 / 44
» Differential privacy for collaborative security
Sort
View
123
Voted
DASFAA
2010
IEEE
148views Database» more  DASFAA 2010»
15 years 8 months ago
Competitive Privacy: Secure Analysis on Integrated Sequence Data
Sequence data analysis has been extensively studied in the literature. However, most previous work focuses on analyzing sequence data from a single source or party. In many applica...
Raymond Chi-Wing Wong, Eric Lo
107
Voted
IWSEC
2007
Springer
15 years 9 months ago
Secure and Private Incentive-Based Advertisement Dissemination in Mobile Ad Hoc Networks
Abstract. Advertisement dissemination is a promising M-commerce application which exploits the capabilities of mobile ad hoc networks to increase the visibility of the products bei...
Alexandre Viejo, Francesc Sebé, Josep Domin...
148
Voted
ADMA
2008
Springer
186views Data Mining» more  ADMA 2008»
15 years 10 months ago
A Distributed Privacy-Preserving Association Rules Mining Scheme Using Frequent-Pattern Tree
Association rules mining is a frequently used technique which finds interesting association and correlation relationships among large set of data items which occur frequently toge...
Chunhua Su, Kouichi Sakurai
136
Voted
ESORICS
2010
Springer
15 years 3 months ago
Secure Multiparty Linear Programming Using Fixed-Point Arithmetic
Collaborative optimization problems can often be modeled as a linear program whose objective function and constraints combine data from several parties. However, important applicat...
Octavian Catrina, Sebastiaan de Hoogh
160
Voted
EDBT
2012
ACM
225views Database» more  EDBT 2012»
13 years 6 months ago
Differentially private search log sanitization with optimal output utility
Web search logs contain extremely sensitive data, as evidenced by the recent AOL incident. However, storing and analyzing search logs can be very useful for many purposes (i.e. in...
Yuan Hong, Jaideep Vaidya, Haibing Lu, Mingrui Wu