Sciweavers

5344 search results - page 18 / 1069
» Privacy-Preserving Set Operations
Sort
View
VLDB
2005
ACM
136views Database» more  VLDB 2005»
14 years 3 months ago
On k-Anonymity and the Curse of Dimensionality
In recent years, the wide availability of personal data has made the problem of privacy preserving data mining an important one. A number of methods have recently been proposed fo...
Charu C. Aggarwal
ACSW
2007
13 years 11 months ago
Controlling Inference: Avoiding P-level Reduction during Analysis
This paper presents a concept hierarchy-based approach to privacy preserving data collection for data mining called the P-level model. The P-level model allows data providers to d...
Adepele Williams, Ken Barker
NDSS
2008
IEEE
14 years 4 months ago
Analysis-Resistant Malware
Traditionally, techniques for computing on encrypted data have been proposed with privacy preserving applications in mind. Several current cryptosystems support a homomorphic oper...
John Bethencourt, Dawn Song, Brent Waters
GLOBECOM
2006
IEEE
14 years 3 months ago
Requirements and Challenges in the Design of Privacy-aware Sensor Networks
Abstract— Sensor networks are set to become a truly ubiquitous technology that will affect the lives of the people in their application environment. While providing the opportuni...
Efthimia Aivaloglou, Stefanos Gritzalis, Charalabo...
ADC
2007
Springer
145views Database» more  ADC 2007»
14 years 4 months ago
The Privacy of k-NN Retrieval for Horizontal Partitioned Data -- New Methods and Applications
Recently, privacy issues have become important in clustering analysis, especially when data is horizontally partitioned over several parties. Associative queries are the core retr...
Artak Amirbekyan, Vladimir Estivill-Castro