Sciweavers

5344 search results - page 4 / 1069
» Privacy-Preserving Set Operations
Sort
View
EDBT
2009
ACM
200views Database» more  EDBT 2009»
14 years 2 months ago
Continuous privacy preserving publishing of data streams
Recently, privacy preserving data publishing has received a lot of attention in both research and applications. Most of the previous studies, however, focus on static data sets. I...
Bin Zhou 0002, Yi Han, Jian Pei, Bin Jiang, Yufei ...
SDM
2007
SIAM
118views Data Mining» more  SDM 2007»
13 years 8 months ago
On Privacy-Preservation of Text and Sparse Binary Data with Sketches
In recent years, privacy preserving data mining has become very important because of the proliferation of large amounts of data on the internet. Many data sets are inherently high...
Charu C. Aggarwal, Philip S. Yu
USS
2010
13 years 5 months ago
PrETP: Privacy-Preserving Electronic Toll Pricing
Current Electronic Toll Pricing (ETP) implementations rely on on-board units sending fine-grained location data to the service provider. We present , a privacy-preserving ETP syst...
Josep Balasch, Alfredo Rial, Carmela Troncoso, Bar...
ICDE
2007
IEEE
128views Database» more  ICDE 2007»
13 years 11 months ago
Realizing Privacy-Preserving Features in Hippocratic Databases
Preserving privacy has become a crucial requirement for operating a business that manages personal data. Hippocratic databases have been proposed to answer this requirement throug...
Yasin Laura-Silva, Walid G. Aref
SDM
2008
SIAM
177views Data Mining» more  SDM 2008»
13 years 9 months ago
Practical Private Computation and Zero-Knowledge Tools for Privacy-Preserving Distributed Data Mining
In this paper we explore private computation built on vector addition and its applications in privacypreserving data mining. Vector addition is a surprisingly general tool for imp...
Yitao Duan, John F. Canny