Sciweavers

2454 search results - page 16 / 491
» Privacy in the Information and Communications Technologies
Sort
View
COCO
2005
Springer
110views Algorithms» more  COCO 2005»
14 years 28 days ago
Prior Entanglement, Message Compression and Privacy in Quantum Communication
Consider a two-party quantum communication protocol for computing some function f : {0, 1}n × {0, 1}n → Z. We show that the first message of P can be compressed to O(k) classi...
Rahul Jain, Jaikumar Radhakrishnan, Pranab Sen
DASFAA
2004
IEEE
125views Database» more  DASFAA 2004»
13 years 11 months ago
Reducing Communication Cost in a Privacy Preserving Distributed Association Rule Mining
Data mining is a process that analyzes voluminous digital data in order to discover hidden but useful patterns from digital data. However, discovery of such hidden patterns has sta...
Mafruz Zaman Ashrafi, David Taniar, Kate A. Smith
DIM
2005
ACM
13 years 9 months ago
Usable presentation of secure pseudonyms
Privacy-Enhancing Identity Management (PIM) enables users to control which personal information they provide to their communication partner(s) by partitioning their personal infor...
Katrin Borcea-Pfitzmann, Elke Franz, Andreas Pfitz...
GIS
2008
ACM
13 years 8 months ago
Towards a scalable model for location privacy
With the growth of wireless and mobile technologies, we are witnessing an increase in location-based services (LBS). Although LBS provide enhanced functionalities, they open up ne...
Nayot Poolsappasit, Indrakshi Ray
CSE
2009
IEEE
14 years 3 days ago
The Circles of Latitude: Adoption and Usage of Location Tracking in Online Social Networking
—This paper reports preliminary results of an ongoing ethnographic study of people’s attitudes towards and adoption of Google Latitude, a location-tracking technology for mobil...
Xinru Page, Alfred Kobsa