Sciweavers

650 search results - page 12 / 130
» Privacy in Non-private Environments
Sort
View
HOTOS
2007
IEEE
14 years 1 months ago
Can Ferris Bueller Still Have His Day Off? Protecting Privacy in the Wireless Era
Today's rich and varied wireless environment, including mobile phones, Wi-Fi-enabled laptops, and Bluetooth headsets, poses threats to our privacy that cannot be addressed wi...
Ben Greenstein, Ramakrishna Gummadi, Jeffrey Pang,...
PETRA
2010
ACM
13 years 7 months ago
The security and privacy implications of using social networks to deliver healthcare
Healthcare technologies have tended to focus on electronic health records and devices (e.g., devices within the home for patients or handheld devices for nurses and physicians), a...
Carrie Gates, Matt Bishop
PERCOM
2004
ACM
14 years 9 months ago
Untraceable Secret Credentials: Trust Establishment with Privacy
There is generally no a priori trust relationship among entities interacting in pervasive computing environments which makes it necessary to establish trust from scratch. This tas...
Laurent Bussard, Yves Roudier, Refik Molva
PKDD
2007
Springer
214views Data Mining» more  PKDD 2007»
14 years 4 months ago
Multi-party, Privacy-Preserving Distributed Data Mining Using a Game Theoretic Framework
Abstract. Analysis of privacy-sensitive data in a multi-party environment often assumes that the parties are well-behaved and they abide by the protocols. Parties compute whatever ...
Hillol Kargupta, Kamalika Das, Kun Liu
ASM
2003
ASM
14 years 3 months ago
Privacy, Abstract Encryption and Protocols: An ASM Model - Part I
d in Abstract State Machines – Advances in Theory and Applications: 10th International Workshop, ASM 2003, volume 2589 of LNCS, Springer–Verlag. Abstract Encryption and Protoco...
Dean Rosenzweig, Davor Runje, Neva Slani