Sciweavers

738 search results - page 62 / 148
» Privacy Protection for Speech Information
Sort
View
ICDE
2007
IEEE
115views Database» more  ICDE 2007»
14 years 3 months ago
A Genetic Approach to Multivariate Microaggregation for Database Privacy
Microaggregation is a technique used to protect privacy in databases and location-based services. We propose a new hybrid technique for multivariate microaggregation. Our techniqu...
Antoni Martínez-Ballesté, Agusti Sol...
PERCOM
2010
ACM
13 years 7 months ago
Integrating people-centric sensing with social networks: A privacy research agenda
During the last few years there has been an increasing number of people-centric sensing projects, which combine location information with other sensors available on mobile devices,...
Ioannis Krontiris, Felix C. Freiling
CRYPTO
2005
Springer
96views Cryptology» more  CRYPTO 2005»
14 years 2 months ago
Privacy-Preserving Set Operations
In many important applications, a collection of mutually distrustful parties must perform private computation over multisets. Each party’s input to the function is his private i...
Lea Kissner, Dawn Xiaodong Song
CIKM
2008
Springer
13 years 11 months ago
Data degradation: making private data less sensitive over time
Trail disclosure is the leakage of privacy sensitive data, resulting from negligence, attack or abusive scrutinization or usage of personal digital trails. To prevent trail disclo...
Nicolas Anciaux, Luc Bouganim, Harold van Heerde, ...
FAST
2009
13 years 7 months ago
Scalable Access Controls for Lineage
Lineage stores often contain sensitive information that needs protection from unauthorized access. We build on prior work for security and privacy of lineage information, focusing...
Arnon Rosenthal, Len Seligman, Adriane Chapman, Ba...