Sciweavers

2272 search results - page 28 / 455
» Provable Data Privacy
Sort
View
WWW
2009
ACM
14 years 8 months ago
Releasing search queries and clicks privately
The question of how to publish an anonymized search log was brought to the forefront by a well-intentioned, but privacy-unaware AOL search log release. Since then a series of ad-h...
Aleksandra Korolova, Krishnaram Kenthapadi, Nina M...
CCS
2006
ACM
13 years 11 months ago
Secure hierarchical in-network aggregation in sensor networks
In-network aggregation is an essential primitive for performing queries on sensor network data. However, most aggregation algorithms assume that all intermediate nodes are trusted...
Haowen Chan, Adrian Perrig, Dawn Xiaodong Song
GI
2009
Springer
13 years 5 months ago
Putting Privacy Pictograms into Practice - a European Perspective
: Recent proposals for privacy pictograms show a growing interest of simplifying privacy-related statements. Such pictograms can be useful to enhance the users' understanding ...
Marit Hansen
ICDE
2005
IEEE
170views Database» more  ICDE 2005»
14 years 9 months ago
Data Privacy through Optimal k-Anonymization
Roberto J. Bayardo Jr., Rakesh Agrawal
IJMMS
2007
75views more  IJMMS 2007»
13 years 7 months ago
Internet users' perceptions of 'privacy concerns' and 'privacy actions'
A consistent finding reported in online privacy research is that an overwhelming majority of people are ‘concerned’ about their privacy when they use the Internet. Therefore,...
Carina Paine, Ulf-Dietrich Reips, Stefan Stieger, ...