Sciweavers

116 search results - page 10 / 24
» Privacy-Preserving Top-K Queries
Sort
View
IJCMAM
2010
133views more  IJCMAM 2010»
13 years 7 months ago
Privacy Preserving Integration of Health Care Data
For health care related research studies the medical records of patients may need to be retrieved from multiple sites with different regulations on the disclosure of health inform...
Xiaoyun He, Jaideep Vaidya, Basit Shafiq, Nabil R....
SIGMOD
2009
ACM
137views Database» more  SIGMOD 2009»
14 years 9 months ago
Privacy preservation of aggregates in hidden databases: why and how?
Many websites provide form-like interfaces which allow users to execute search queries on the underlying hidden databases. In this paper, we explain the importance of protecting s...
Arjun Dasgupta, Nan Zhang, Gautam Das, Surajit Cha...
ACNS
2005
Springer
183views Cryptology» more  ACNS 2005»
14 years 3 months ago
Privacy Preserving Keyword Searches on Remote Encrypted Data
We consider the following problem: a user U wants to store his files in an encrypted form on a remote file server S. Later the user U wants to efficiently retrieve some of the en...
Yan-Cheng Chang, Michael Mitzenmacher
CCS
2007
ACM
14 years 3 months ago
Privacy preserving error resilient dna searching through oblivious automata
Human Desoxyribo-Nucleic Acid (DNA) sequences offer a wealth of information that reveal, among others, predisposition to various diseases and paternity relations. The breadth and...
Juan Ramón Troncoso-Pastoriza, Stefan Katze...
SDMW
2009
Springer
14 years 2 months ago
Longitude: Centralized Privacy-Preserving Computation of Users' Proximity
A “friend finder” is a Location Based Service (LBS) that informs users about the presence of participants in a geographical area. In particular, one of the functionalities of ...
Sergio Mascetti, Claudio Bettini, Dario Freni