Sciweavers

43 search results - page 5 / 9
» Privacy-Preserving Inter-database Operations
Sort
View
VLDB
2004
ACM
134views Database» more  VLDB 2004»
14 years 13 days ago
A Privacy-Preserving Index for Range Queries
Database outsourcing is an emerging data management paradigm which has the potential to transform the IT operations of corporations. In this paper we address privacy threats in da...
Bijit Hore, Sharad Mehrotra, Gene Tsudik
PERCOM
2011
ACM
12 years 10 months ago
Privacy preservation schemes for querying wireless sensor networks
—In this work we study the problem of query privacy in large scale sensor networks. Motivated by a novel trust model in which clients query networks owned by trusted entities but...
Tassos Dimitriou, Ahmad Sabouri
ICISC
2009
184views Cryptology» more  ICISC 2009»
13 years 4 months ago
Efficient Privacy-Preserving Face Recognition
Abstract. Automatic recognition of human faces is becoming increasingly popular in civilian and law enforcement applications that require reliable recognition of humans. However, t...
Ahmad-Reza Sadeghi, Thomas Schneider 0003, Immo We...
SIGMOD
2012
ACM
220views Database» more  SIGMOD 2012»
11 years 9 months ago
GUPT: privacy preserving data analysis made easy
It is often highly valuable for organizations to have their data analyzed by external agents. However, any program that computes on potentially sensitive data risks leaking inform...
Prashanth Mohan, Abhradeep Thakurta, Elaine Shi, D...
USS
2004
13 years 8 months ago
Privacy-Preserving Sharing and Correlation of Security Alerts
Patrick Lincoln, Phillip A. Porras, Vitaly Shmatik...