Sciweavers

74 search results - page 3 / 15
» On Anti-Corruption Privacy Preserving Publication
Sort
View
ICDCS
2011
IEEE
12 years 7 months ago
Privacy-Preserving Query over Encrypted Graph-Structured Data in Cloud Computing
— In the emerging cloud computing paradigm, data owners become increasingly motivated to outsource their complex data management systems from local sites to the commercial public...
Ning Cao, Zhenyu Yang, Cong Wang, Kui Ren, Wenjing...
CEAS
2008
Springer
13 years 9 months ago
A Mail Client Plugin for Privacy-Preserving Spam Filter Evaluation
We describe a plugin extension to the Thunderbird Mail Client to support standardized evaluation of multiple spam filters on private mail streams. Researchers need not view or han...
Mona Mojdeh, Gordon V. Cormack
ICISC
2007
134views Cryptology» more  ICISC 2007»
13 years 9 months ago
A Lightweight Privacy Preserving Authentication and Access Control Scheme for Ubiquitous Computing Environment
In Ubiquitous Computing Environment (UCE), service provider wants to provide its service to only legitimate users. Some users who belong to same service provider do not want to rev...
Jangseong Kim, Zeen Kim, Kwangjo Kim
ESORICS
2009
Springer
14 years 2 months ago
Privacy Preserving Publication of Moving Object Data
The increasing availability of space-time trajectories left by location-aware devices is expected to enable novel classes of applications where the discovery of consumable, concise...
Francesco Bonchi
SIGMOD
2010
ACM
274views Database» more  SIGMOD 2010»
14 years 16 days ago
K-isomorphism: privacy preserving network publication against structural attacks
Serious concerns on privacy protection in social networks have been raised in recent years; however, research in this area is still in its infancy. The problem is challenging due ...
James Cheng, Ada Wai-Chee Fu, Jia Liu