Privacy-preserving computation of benchmarks on item-level data using RFID
Proceedings of the third ACM conference on Wireless network security
A historical probability based noise generation strategy for privacy protection in cloud computing
Journal of Computer and System Sciences
Hi-index | 0.00 |
To protect user privacy in the search engine context, most current approaches, such as private information retrieval and privacy preserving data mining, require a server-side deployment, thus users have little control over their data and privacy. In ...