Sciweavers

43 search results - page 5 / 9
» Privacy Preserving Keyword Searches on Remote Encrypted Data
Sort
View
CCS
2005
ACM
14 years 1 months ago
Applications of secure electronic voting to automated privacy-preserving troubleshooting
Recent work [27, 15] introduced a novel peer-to-peer application that leverages content sharing and aggregation among the peers to diagnose misconfigurations on a desktop PC. Thi...
Qiang Huang, David Jao, Helen J. Wang
MOBISYS
2007
ACM
14 years 7 months ago
Preserving location privacy in wireless lans
The broadcast and tetherless nature of wireless networks and the widespread deployment of Wi-Fi hotspots makes it easy to remotely locate a user by observing her wireless signals....
Tao Jiang, Helen J. Wang, Yih-Chun Hu
CCS
2007
ACM
14 years 2 months ago
Privacy-preserving remote diagnostics
We present an efficient protocol for privacy-preserving evaluation of diagnostic programs, represented as binary decision trees or branching programs. The protocol applies a bran...
Justin Brickell, Donald E. Porter, Vitaly Shmatiko...
SAC
2005
ACM
14 years 1 months ago
Privacy preserving learning in negotiation
Machine learning techniques are widely used in negotiation systems. To get more accurate and satisfactory learning results, negotiation parties have the desire to employ learning ...
Sheng Zhang, Fillia Makedon
CCS
2008
ACM
13 years 9 months ago
Building castles out of mud: practical access pattern privacy and correctness on untrusted storage
We introduce a new practical mechanism for remote data storage with efficient access pattern privacy and correctness. A storage client can deploy this mechanism to issue encrypted...
Peter Williams, Radu Sion, Bogdan Carbunar