Sciweavers

2272 search results - page 32 / 455
» Provable Data Privacy
Sort
View
FC
1998
Springer
83views Cryptology» more  FC 1998»
14 years 3 days ago
Distributed Trustees and Revocability: A Framework for Internet Payment
From von Solms and Naccache's standpoint, constructing a practical and secure e-money system implies a proper regulation of its privacy level. Furthermore, when the system ben...
David M'Raïhi, David Pointcheval
CRYPTO
2007
Springer
172views Cryptology» more  CRYPTO 2007»
13 years 12 months ago
Deterministic and Efficiently Searchable Encryption
We present as-strong-as-possible definitions of privacy, and constructions achieving them, for public-key encryption schemes where the encryption algorithm is deterministic. We ob...
Mihir Bellare, Alexandra Boldyreva, Adam O'Neill
ICDE
2009
IEEE
192views Database» more  ICDE 2009»
14 years 9 months ago
Deriving Private Information from Association Rule Mining Results
Data publishing can provide enormous benefits to the society. However, due to privacy concerns, data cannot be published in their original forms. Two types of data publishing can a...
Zutao Zhu, Guan Wang, Wenliang Du
SBBD
2003
135views Database» more  SBBD 2003»
13 years 9 months ago
Privacy Preserving Clustering by Data Transformation
Despite its benefit in a wide range of applications, data mining techniques also have raised a number of ethical issues. Some such issues include those of privacy, data security,...
Stanley R. M. Oliveira, Osmar R. Zaïane
EDBT
2009
ACM
195views Database» more  EDBT 2009»
14 years 2 months ago
Anonymizing moving objects: how to hide a MOB in a crowd?
Moving object databases (MOD) have gained much interest in recent years due to the advances in mobile communications and positioning technologies. Study of MOD can reveal useful i...
Roman Yarovoy, Francesco Bonchi, Laks V. S. Lakshm...