Sciweavers

188 search results - page 2 / 38
» Revealing information while preserving privacy
Sort
View
ICDE
2005
IEEE
147views Database» more  ICDE 2005»
14 years 4 months ago
Privacy-Preserving Top-K Queries
Processing of top-k queries has been attracting considerable attention. Much of the work assumes distributed data, with each site holding a different set of attributes for the sam...
Jaideep Vaidya, Chris Clifton
NDSS
2009
IEEE
14 years 5 months ago
Two-Party Computation Model for Privacy-Preserving Queries over Distributed Databases
Many existing privacy-preserving techniques for querying distributed databases of sensitive information do not scale for large databases due to the use of heavyweight cryptographi...
Sherman S. M. Chow, Jie-Han Lee, Lakshminarayanan ...
CIKM
2006
Springer
14 years 2 months ago
Privacy preserving sequential pattern mining in distributed databases
Research in the areas of privacy preserving techniques in databases and subsequently in privacy enhancement technologies have witnessed an explosive growth-spurt in recent years. ...
Vishal Kapoor, Pascal Poncelet, François Tr...
SDMW
2009
Springer
14 years 3 months ago
Longitude: Centralized Privacy-Preserving Computation of Users' Proximity
A “friend finder” is a Location Based Service (LBS) that informs users about the presence of participants in a geographical area. In particular, one of the functionalities of ...
Sergio Mascetti, Claudio Bettini, Dario Freni
PERVASIVE
2008
Springer
13 years 10 months ago
AnonySense: Opportunistic and Privacy-Preserving Context Collection
Opportunistic sensing allows applications to "task" mobile devices to measure context in a target region. For example, one could leverage sensorequipped vehicles to measu...
Apu Kapadia, Nikos Triandopoulos, Cory Cornelius, ...