Sciweavers

382 search results - page 11 / 77
» k-Anonymity: A Model for Protecting Privacy
Sort
View
GIS
2009
ACM
13 years 5 months ago
Distortion-based anonymity for continuous queries in location-based mobile services
Privacy preservation has recently received considerable attention for location-based mobile services. Various location cloaking approaches have been proposed to protect the locati...
Xiao Pan, Xiaofeng Meng, Jianliang Xu
COMAD
2008
13 years 9 months ago
Ambiguity: Hide the Presence of Individuals and Their Privacy with Low Information Loss
Publishing a database instance containing individual information poses two kinds of privacy risk: presence leakage, by which the attackers can explicitly identify individuals in (...
Hui Wang
ATAL
2005
Springer
14 years 1 months ago
The value of privacy: optimal strategies for privacy minded agents
Agents often want to protect private information, while at the same acting upon the information. These two desires are in conflict, and this conflict can be modeled in strategic...
Sieuwert van Otterloo
SEC
2008
13 years 9 months ago
Hiding in Groups: On the Expressiveness of Privacy Distributions
Many applications inherently disclose information because perfect privacy protection is prohibitively expensive. RFID tags, for example, cannot be equipped with the cryptographic p...
Karsten Nohl, David Evans
CCS
2011
ACM
12 years 7 months ago
Televisions, video privacy, and powerline electromagnetic interference
We conduct an extensive study of information leakage over the powerline infrastructure from eight televisions (TVs) spanning multiple makes, models, and underlying technologies. I...
Miro Enev, Sidhant Gupta, Tadayoshi Kohno, Shwetak...