Results 331 to 340 of about 1,840,684 (372)
Some of the next articles are maybe not open access.

Location Privacy-preserving Mechanisms in Location-based Services

ACM Computing Surveys, 2021
Location-based services (LBSs) provide enhanced functionality and convenience of ubiquitous computing, but they open up new vulnerabilities that can be utilized to violate the users’ privacy.
Hongbo Jiang   +5 more
semanticscholar   +1 more source

Blockchain-Based Privacy-Preserving and Rewarding Private Data Sharing for IoT

IEEE Internet of Things Journal, 2022
The Internet of Things (IoT) devices possessed by individuals produce massive amounts of data. The private data onto specific IoT devices can be combined with intelligent platform to provide help for future research and prediction.
Tian Li, Huaqun Wang, De-biao He, Jia Yu
semanticscholar   +1 more source

Privacy Preserving Auctions

ACM Conference on Economics and Computation
In many auction settings the auctioneer must disclose the identity of the winner and the price he pays. We characterize the auction that minimizes the winner's privacy loss among those that maximize total surplus or the seller's revenue, and are strategy-
Ran Eilat, K. Eliaz, Xiaosheng Mu
semanticscholar   +1 more source

Privacy-Preserving Smart Metering

Proceedings of the 10th annual ACM workshop on Privacy in the electronic society, 2011
Smart grid proposals threaten user privacy by potentially disclosing fine-grained consumption data to utility providers, primarily for time-of-use billing, but also for profiling, settlement, forecasting, tariff and energy efficiency advice. We propose a privacy-preserving protocol for general calculations on fine-grained meter readings, while keeping ...
Alfredo Rial, George Danezis
openaire   +1 more source

Privacy-preserving DRM

Proceedings of the 9th Symposium on Identity and Trust on the Internet, 2010
This paper describes and contrasts two families of schemes that enable a user to purchase digital content without revealing to anyone what item he has purchased. One of the basic schemes is based on anonymous cash, and the other on blind decryption.
Radia Perlman   +2 more
openaire   +1 more source

Privacy-preserving Computing

2023
Privacy-preserving computing aims to protect the personal information of users while capitalizing on the possibilities unlocked by big data. This practical introduction for students, researchers, and industry practitioners is the first cohesive and systematic presentation of the field's advances over four decades.
Chen, Kai, Yang, Qiang
openaire   +2 more sources

Privacy preservation services

Proceedings of the 2008 ACM symposium on Applied computing, 2008
The current Internet architecture was designed at a time when many of the current network applications did not even exist. As a result, it has become increasingly difficult to deploy new and secure services on the Internet. Hence, a new Internet architecture is required to address the security and usability issues that affect the current Internet.
Dijiang Huang   +2 more
openaire   +1 more source

Privacy-preserving polling

Communications of the ACM, 2020
Can you answer a poll without revealing your true preferences and have the results of the poll still be accurate?
openaire   +1 more source

Privacy-Preserving WSDM

Proceedings of the Twelfth ACM International Conference on Web Search and Data Mining, 2019
The goals of learning from user data and preserving user privacy are often considered to be in conflict. This presentation will demonstrate that there are contexts when provable privacy guarantees can be an enabler for better web search and data mining (WSDM), and can empower researchers hoping to change the world by mining sensitive user data.
openaire   +1 more source

Privacy Preserving Tâtonnement

2014
Leon Walras’ theory of general equilibrium put forth the notion of tâtonnement as a process by which equilibrium prices are determined. Recently, Cole and Fleischer provided tâtonnement algorithms for both the classic One-Time and Ongoing Markets with guaranteed bounds for convergence to equilibrium prices. However, in order to reach equilibrium, trade
John Ross Wallrabenstein, Chris Clifton
openaire   +1 more source

Home - About - Disclaimer - Privacy