Sciweavers

7163 search results - page 38 / 1433
» Privacy-Preserving Data Mining
Sort
View
ICC
2007
IEEE
142views Communications» more  ICC 2007»
14 years 4 months ago
Distributed Privacy-Preserving Policy Reconciliation
— Organizations use security policies to regulate how they share and exchange information, e.g., under what conditions data can be exchanged, what protocols are to be used, who i...
Ulrike Meyer, Susanne Wetzel, Sotiris Ioannidis
MOBIQUITOUS
2007
IEEE
14 years 4 months ago
Privacy-Preserving Detection of Sybil Attacks in Vehicular Ad Hoc Networks
— Vehicular ad hoc networks (VANETs) are being advocated for traffic control, accident avoidance, and a variety of other applications. Security is an important concern in VANETs...
Tong Zhou, Romit Roy Choudhury, Peng Ning, Krishne...
MDM
2007
Springer
136views Communications» more  MDM 2007»
14 years 4 months ago
iPDA: Supporting Privacy-Preserving Location-Based Mobile Services
This demonstration presents iPDA, a system to support privacy-preserving data access in location-based mobile services. The iPDA system consists of three main components: 1) a mob...
Jing Du, Jianliang Xu, Xueyan Tang, Haibo Hu
SAC
2005
ACM
14 years 3 months ago
Privacy preserving learning in negotiation
Machine learning techniques are widely used in negotiation systems. To get more accurate and satisfactory learning results, negotiation parties have the desire to employ learning ...
Sheng Zhang, Fillia Makedon
DIM
2006
ACM
14 years 3 months ago
Privacy preserving multi-factor authentication with biometrics
An emerging approach to the problem of reducing the identity theft is represented by the adoption of biometric authentication systems. Such systems however present however several...
Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciari...