Sciweavers

656 search results - page 50 / 132
» Noiseless Database Privacy
Sort
View
CIKM
2008
Springer
13 years 11 months ago
Protecting location privacy against location-dependent attack in mobile services
Privacy preservation has recently received considerable attention for location-based mobile services. In this paper, we present location-dependent attack resulting from continuous...
Xiao Pan, Jianliang Xu, Xiaofeng Meng
ICIP
2010
IEEE
13 years 8 months ago
Security analysis for privacy preserving search of multimedia
With the increasing popularity of digital multimedia such as images and videos and the advent of the cloud computing paradigm, a fast growing amount of private and sensitive multi...
Wenjun Lu, Avinash L. Varna, Min Wu
EDBT
2009
ACM
136views Database» more  EDBT 2009»
14 years 4 months ago
On the comparison of microdata disclosure control algorithms
Privacy models such as k-anonymity and -diversity typically offer an aggregate or scalar notion of the privacy property that holds collectively on the entire anonymized data set....
Rinku Dewri, Indrajit Ray, Indrakshi Ray, Darrell ...
IEEEARES
2008
IEEE
14 years 4 months ago
Privacy-Preserving Distributed Set Intersection
With the growing demand of databases outsourcing and its security concerns, we investigate privacy-preserving set intersection in a distributed scenario. We propose a one-round pr...
Qingsong Ye, Huaxiong Wang, Christophe Tartary
ICDM
2005
IEEE
139views Data Mining» more  ICDM 2005»
14 years 3 months ago
Approximate Inverse Frequent Itemset Mining: Privacy, Complexity, and Approximation
In order to generate synthetic basket data sets for better benchmark testing, it is important to integrate characteristics from real-life databases into the synthetic basket data ...
Yongge Wang, Xintao Wu