Sciweavers

1663 search results - page 79 / 333
» Privacy and Identity Management
Sort
View
AXMEDIS
2006
IEEE
215views Multimedia» more  AXMEDIS 2006»
15 years 10 months ago
Distributed Architectures for High Performance and Privacy-Aware Content Generation and Delivery
The increasing heterogeneity of mobile client devices used to access the Web requires run-time adaptations of the Web contents. A significant trend in these content adaptation se...
Claudia Canali, Michele Colajanni, Riccardo Lancel...
162
Voted
FC
2004
Springer
129views Cryptology» more  FC 2004»
15 years 9 months ago
A Privacy-Friendly Loyalty System Based on Discrete Logarithms over Elliptic Curves
Abstract. Systems for the support of customer relationship management are becoming increasingly attractive for vendors. Loyalty systems provide an interesting possibility for vendo...
Matthias Enzmann, Marc Fischlin, Markus Schneider ...
KDD
2004
ACM
137views Data Mining» more  KDD 2004»
16 years 4 months ago
When do data mining results violate privacy?
Privacy-preserving data mining has concentrated on obtaining valid results when the input data is private. An extreme example is Secure Multiparty Computation-based methods, where...
Murat Kantarcioglu, Jiashun Jin, Chris Clifton
PET
2012
Springer
13 years 6 months ago
Fault-Tolerant Privacy-Preserving Statistics
Real-time statistics on smart meter consumption data must preserve consumer privacy and tolerate smart meter failures. Existing protocols for this private distributed aggregation m...
Marek Jawurek, Florian Kerschbaum
MOBISYS
2007
ACM
16 years 4 months ago
Preserving location privacy in wireless lans
The broadcast and tetherless nature of wireless networks and the widespread deployment of Wi-Fi hotspots makes it easy to remotely locate a user by observing her wireless signals....
Tao Jiang, Helen J. Wang, Yih-Chun Hu