Sciweavers

2272 search results - page 320 / 455
» Provable Data Privacy
Sort
View
GRC
2007
IEEE
14 years 4 months ago
Secure Similarity Search
— One of the most substantial ways to protect users’ sensitive information is encryption. This paper is about the keyword index search system on encrypted documents. It has bee...
Hyun-A Park, Bum Han Kim, Dong Hoon Lee, Yon Dohn ...
DEXA
2007
Springer
140views Database» more  DEXA 2007»
14 years 3 months ago
Clustering-Based K-Anonymisation Algorithms
Abstract. K-anonymisation is an approach to protecting private information contained within a dataset. Many k-anonymisation methods have been proposed recently and one class of suc...
Grigorios Loukides, Jianhua Shao
ICB
2007
Springer
427views Biometrics» more  ICB 2007»
14 years 3 months ago
"3D Face": Biometric Template Protection for 3D Face Recognition
Abstract. In this paper we apply template protection to an authentication system based on 3D face data in order to protect the privacy of its users. We use the template protection ...
Emile J. C. Kelkboom, Berk Gökberk, Tom A. M....
DFMA
2005
IEEE
206views Multimedia» more  DFMA 2005»
14 years 3 months ago
A Collaborative Extension of a Visualization System
This paper presents an extension of the single-user scientific visualization system ZoomIn to a collaborative system. We discuss the principal challenges of remote collaboration i...
Steve Casera, Hans-Heinrich Nägeli, Peter Kro...
ICDM
2005
IEEE
157views Data Mining» more  ICDM 2005»
14 years 3 months ago
Blocking Anonymity Threats Raised by Frequent Itemset Mining
In this paper we study when the disclosure of data mining results represents, per se, a threat to the anonymity of the individuals recorded in the analyzed database. The novelty o...
Maurizio Atzori, Francesco Bonchi, Fosca Giannotti...