Results 21 to 30 of about 500,755 (330)
BLC: Private Matrix Factorization Recommenders via Automatic Group Learning [PDF]
We propose a privacy-enhanced matrix factorization recommender that exploits the fact that users can often be grouped together by interest. This allows a form of “hiding in the crowd” privacy.
Bianchi, G., Checco, A., Leith, D.J.
core +2 more sources
Merging and Extending the PGP and PEM Trust Models - the ICE-TEL Trust Model [PDF]
The ICE-TEL project is a pan-European project that is building an Internet X.509 based certification infrastructure throughout Europe, plus several secure applications that will use it.
Chadwick, David W. +2 more
core +1 more source
High frequency reporting of energy consumption data in smart grids can be used to infer sensitive information regarding the consumer’s life style and poses serious security and privacy threats.
Khadija Hafeez +3 more
doaj +1 more source
An Enhanced Source Location Privacy based on Data Dissemination in Wireless Sensor Networks (DeLP) [PDF]
open access articleWireless Sensor Network is a network of large number of nodes with limited power and computational capabilities. It has the potential of event monitoring in unattended locations where there is a chance of unauthorized access.
Al-Bayati, Ali H. +3 more
core +1 more source
Privacy-Friendly Mobility Analytics using Aggregate Location Data [PDF]
Location data can be extremely useful to study commuting patterns and disruptions, as well as to predict real-time traffic volumes. At the same time, however, the fine-grained collection of user locations raises serious privacy concerns, as this can ...
De Cristofaro, Emiliano +2 more
core +2 more sources
Privacy enhancing technology [PDF]
Abstract This article provides an overview of some of the emerging technologies that currently and potentially will impact the privacy of every individual. The focus is centred around computer or computer-driven applications, although there are other techniques that can be used to impact personal privacy.
openaire +1 more source
Privacy-Enhanced Federated Learning for Non-IID Data
Federated learning (FL) allows the collaborative training of a collective model by a vast number of decentralized clients while ensuring that these clients’ data remain private and are not shared. In practical situations, the training data utilized in FL
Qingjie Tan, Shuhui Wu, Yuanhong Tao
doaj +1 more source
Extended Capabilities for a Privacy-Enhanced Participatory Sensing Infrastructure (PEPSI)
Participatory sensing is emerging as an innovative computing paradigm that targets the ubiquity of always-connected mobile phones and their sensing capabilities.
De Cristofaro, Emiliano +1 more
core +1 more source
Achieving Privacy-Preserving Subset Aggregation in Fog-Enhanced IoT
Fog-enhanced IoT (Internet of Things) is a fast-growing technology in which many firms and industries are currently investing to develop their own real-time and low latency scenarios. Compared with the traditional IoT, fog-enhanced IoT can offer a higher
Hassan Mahdikhani +4 more
doaj +1 more source
Secure quantum key distribution using squeezed states [PDF]
We prove the security of a quantum key distribution scheme based on transmission of squeezed quantum states of a harmonic oscillator. Our proof employs quantum error-correcting codes that encode a finite-dimensional quantum system in the infinite ...
A.M. Steane +20 more
core +2 more sources

