Sciweavers

5255 search results - page 113 / 1051
» Formal Methods for Privacy
Sort
View
NDSS
2009
IEEE
15 years 9 months ago
Two-Party Computation Model for Privacy-Preserving Queries over Distributed Databases
Many existing privacy-preserving techniques for querying distributed databases of sensitive information do not scale for large databases due to the use of heavyweight cryptographi...
Sherman S. M. Chow, Jie-Han Lee, Lakshminarayanan ...
142
Voted
SBBD
2003
135views Database» more  SBBD 2003»
15 years 3 months ago
Privacy Preserving Clustering by Data Transformation
Despite its benefit in a wide range of applications, data mining techniques also have raised a number of ethical issues. Some such issues include those of privacy, data security,...
Stanley R. M. Oliveira, Osmar R. Zaïane
CISC
2008
Springer
152views Cryptology» more  CISC 2008»
15 years 4 months ago
Privacy for Private Key in Signatures
One of the important applications of digital signature is anonymous credential or pseudonym system. In these scenarios, it is essential that the identity of the signer is kept secr...
Qianhong Wu, Bo Qin, Yi Mu, Willy Susilo
CISC
2008
Springer
148views Cryptology» more  CISC 2008»
15 years 4 months ago
Publicly Verifiable Privacy-Preserving Group Decryption
Anonymity is one of the main concerns in group-oriented cryptography. However, most efforts, for instance, group signatures and ring signatures, are only made to provide anonymity ...
Bo Qin, Qianhong Wu, Willy Susilo, Yi Mu
117
Voted
ICDM
2008
IEEE
130views Data Mining» more  ICDM 2008»
15 years 9 months ago
Inference Analysis in Privacy-Preserving Data Re-publishing
Privacy-Preserving Data Re-publishing (PPDR) deals with publishing microdata in dynamic scenarios. Due to privacy concerns, data must be disguised before being published. Research...
Guan Wang, Zutao Zhu, Wenliang Du, Zhouxuan Teng