Sciweavers

841 search results - page 85 / 169
» RFIDs and Personal Privacy
Sort
View
SIGCOMM
2010
ACM
13 years 9 months ago
Trust no one: a decentralized matching service for privacy in location based services
We propose a new approach to ensure privacy in location based services, without requiring any support from a"trusted" entity. We observe that users of location based ser...
Sharad Jaiswal, Animesh Nandi
SIGMOD
2010
ACM
243views Database» more  SIGMOD 2010»
13 years 9 months ago
Non-homogeneous generalization in privacy preserving data publishing
Most previous research on privacy-preserving data publishing, based on the k-anonymity model, has followed the simplistic approach of homogeneously giving the same generalized val...
Wai Kit Wong, Nikos Mamoulis, David Wai-Lok Cheung
STOC
2010
ACM
193views Algorithms» more  STOC 2010»
14 years 12 days ago
Privacy Amplification with Asymptotically Optimal Entropy Loss
We study the problem of "privacy amplification": key agreement between two parties who both know a weak secret w, such as a password. (Such a setting is ubiquitous on th...
Nishanth Chandran, Bhavana Kanukurthi, Rafail Ostr...
IADIS
2004
13 years 10 months ago
Collaborative Task Scheduling Method Based on Social Network Analysis for Cellphone Application
This paper proposes a collaborative approach for personal task management which is modeled as an alliance model. Alliance model is based on information sharing and collaboration o...
Ikki Ohmukai, Hideaki Takeda
TDHMS
2010
13 years 7 months ago
Color Based Tracing in Real-Life Surveillance Data
For post incident investigation a complete reconstruction of an event is needed based on surveillance footage of the crime scene and surrounding areas. Reconstruction of the wherea...
Michael J. Metternich, Marcel Worring, Arnold W. M...