Sciweavers

1790 search results - page 346 / 358
» On Privacy Models for RFID
Sort
View
CORR
2002
Springer
131views Education» more  CORR 2002»
13 years 10 months ago
A Connection-Centric Survey of Recommender Systems Research
Recommender systems attempt to reduce information overload and retain customers by selecting a subset of items from a universal set based on user preferences. While research in rec...
Saverio Perugini, Marcos André Gonça...
SAC
2010
ACM
13 years 9 months ago
The 'Dresden Image Database' for benchmarking digital image forensics
This paper introduces and documents a novel image database specifically built for the purpose of development and benchmarking of camera-based digital forensic techniques. More th...
Thomas Gloe, Rainer Böhme
ICDE
2008
IEEE
140views Database» more  ICDE 2008»
15 years 8 days ago
A Security Punctuation Framework for Enforcing Access Control on Streaming Data
The management of privacy and security in the context of data stream management systems (DSMS) remains largely an unaddressed problem to date. Unlike in traditional DBMSs where acc...
Rimma V. Nehme, Elke A. Rundensteiner, Elisa Berti...
SIGMOD
2009
ACM
197views Database» more  SIGMOD 2009»
14 years 11 months ago
Secure kNN computation on encrypted databases
Service providers like Google and Amazon are moving into the SaaS (Software as a Service) business. They turn their huge infrastructure into a cloud-computing environment and aggr...
Wai Kit Wong, David Wai-Lok Cheung, Ben Kao, Nikos...
CTRSA
2009
Springer
179views Cryptology» more  CTRSA 2009»
14 years 5 months ago
Adaptively Secure Two-Party Computation with Erasures
In the setting of multiparty computation a set of parties with private inputs wish to compute some joint function of their inputs, whilst preserving certain security properties (l...
Andrew Y. Lindell