Sciweavers

738 search results - page 31 / 148
» Privacy Protection for Speech Information
Sort
View
SIGMOD
2009
ACM
137views Database» more  SIGMOD 2009»
14 years 9 months ago
Privacy preservation of aggregates in hidden databases: why and how?
Many websites provide form-like interfaces which allow users to execute search queries on the underlying hidden databases. In this paper, we explain the importance of protecting s...
Arjun Dasgupta, Nan Zhang, Gautam Das, Surajit Cha...
COSIT
2005
Springer
95views GIS» more  COSIT 2005»
14 years 2 months ago
Simulation of Obfuscation and Negotiation for Location Privacy
Abstract. Current mobile computing systems can automatically sense and communicate detailed data about a person’s location. Location privacy is an urgent research issue because c...
Matt Duckham, Lars Kulik
VLDB
2006
ACM
172views Database» more  VLDB 2006»
14 years 9 months ago
Hierarchical hippocratic databases with minimal disclosure for virtual organizations
Abstract The protection of customer privacy is a fundamental issue in today's corporate marketing strategies. Not surprisingly, many research efforts have proposed new privacy...
Fabio Massacci, John Mylopoulos, Nicola Zannone
CONEXT
2009
ACM
13 years 10 months ago
StarClique: guaranteeing user privacy in social networks against intersection attacks
Building on the popularity of online social networks (OSNs) such as Facebook, social content-sharing applications allow users to form communities around shared interests. Millions...
Krishna P. N. Puttaswamy, Alessandra Sala, Ben Y. ...
SPW
2004
Springer
14 years 2 months ago
Accountable Privacy
Hardly a day passes without reports of new threats in or about the Internet. Denial of service, worms, viruses, spam, and divulged credit card information highlight the major secu...
Mike Burmester, Yvo Desmedt, Rebecca N. Wright, Al...