Sciweavers

1005 search results - page 59 / 201
» Privacy Preserving Clustering
Sort
View
ICISC
2007
134views Cryptology» more  ICISC 2007»
13 years 11 months ago
A Lightweight Privacy Preserving Authentication and Access Control Scheme for Ubiquitous Computing Environment
In Ubiquitous Computing Environment (UCE), service provider wants to provide its service to only legitimate users. Some users who belong to same service provider do not want to rev...
Jangseong Kim, Zeen Kim, Kwangjo Kim
SDM
2008
SIAM
177views Data Mining» more  SDM 2008»
13 years 11 months ago
Practical Private Computation and Zero-Knowledge Tools for Privacy-Preserving Distributed Data Mining
In this paper we explore private computation built on vector addition and its applications in privacypreserving data mining. Vector addition is a surprisingly general tool for imp...
Yitao Duan, John F. Canny
NIPS
2007
13 years 11 months ago
Privacy-Preserving Belief Propagation and Sampling
We provide provably privacy-preserving versions of belief propagation, Gibbs sampling, and other local algorithms — distributed multiparty protocols in which each party or verte...
Michael Kearns, Jinsong Tan, Jennifer Wortman
SDM
2007
SIAM
190views Data Mining» more  SDM 2007»
13 years 11 months ago
AC-Framework for Privacy-Preserving Collaboration
The secure multi-party computation (SMC) model provides means for balancing the use and confidentiality of distributed data. Increasing security concerns have led to a surge in w...
Wei Jiang, Chris Clifton