Sciweavers

947 search results - page 135 / 190
» Information Security in Mobile Databases
Sort
View
CCS
2008
ACM
14 years 3 days ago
Building castles out of mud: practical access pattern privacy and correctness on untrusted storage
We introduce a new practical mechanism for remote data storage with efficient access pattern privacy and correctness. A storage client can deploy this mechanism to issue encrypted...
Peter Williams, Radu Sion, Bogdan Carbunar
CCS
2011
ACM
12 years 11 months ago
Practical PIR for electronic commerce
We extend Goldberg’s multi-server information-theoretic private information retrieval (PIR) with a suite of protocols for privacypreserving e-commerce. Our first protocol adds ...
Ryan Henry, Femi G. Olumofin, Ian Goldberg
KDD
2007
ACM
168views Data Mining» more  KDD 2007»
14 years 11 months ago
Finding tribes: identifying close-knit individuals from employment patterns
We present a family of algorithms to uncover tribes--groups of individuals who share unusual sequences of affiliations. While much work inferring community structure describes lar...
Lisa Friedland, David Jensen
ICDE
2009
IEEE
136views Database» more  ICDE 2009»
15 years 22 days ago
A Concise Representation of Range Queries
Abstract--With the advance of wireless communication technology, it is quite common for people to view maps or get related services from the handheld devices, such as mobile phones...
Ke Yi, Xiang Lian, Feifei Li, Lei Chen 0002
MOBISYS
2007
ACM
14 years 10 months ago
SmokeScreen: flexible privacy controls for presence-sharing
Presence-sharing is an emerging platform for mobile applications, but presence-privacy remains a challenge. Privacy controls must be flexible enough to allow sharing between both ...
Landon P. Cox, Angela Dalton, Varun Marupadi