Sciweavers

1005 search results - page 57 / 201
» Privacy Preserving Clustering
Sort
View
ICDM
2007
IEEE
138views Data Mining» more  ICDM 2007»
14 years 1 months ago
Preserving Privacy through Data Generation
Many databases will not or can not be disclosed without strong guarantees that no sensitive information can be extracted. To address this concern several data perturbation techniq...
Jilles Vreeken, Matthijs van Leeuwen, Arno Siebes
PAKDD
2010
ACM
182views Data Mining» more  PAKDD 2010»
14 years 1 months ago
Computation of Ratios of Secure Summations in Multi-party Privacy-Preserving Latent Dirichlet Allocation
In this paper, we focus our attention on the problem of computing the ratio of two numbers, both of which are the summations of the private numbers distributed in different parties...
Bin Yang, Hiroshi Nakagawa
CRYPTO
2006
Springer
101views Cryptology» more  CRYPTO 2006»
14 years 1 months ago
When Random Sampling Preserves Privacy
Kamalika Chaudhuri, Nina Mishra
CSE
2009
IEEE
14 years 1 months ago
Adapting Privacy-Preserving Computation to the Service Provider Model
There are many applications for Secure Multi-Party Computation (SMC), but practical adoption is still an issue. One reason is that the business model of the application does not m...
Florian Kerschbaum
CISC
2008
Springer
148views Cryptology» more  CISC 2008»
13 years 12 months ago
Publicly Verifiable Privacy-Preserving Group Decryption
Anonymity is one of the main concerns in group-oriented cryptography. However, most efforts, for instance, group signatures and ring signatures, are only made to provide anonymity ...
Bo Qin, Qianhong Wu, Willy Susilo, Yi Mu