A New Framework for Privacy-Preserving Aggregation of Time-Series Data [PDF]
International audienceAggregator-oblivious encryption is a useful notion put forward by Shi et al. in 2011 that allows an untrusted aggregator to periodically compute an aggregate value over encrypted data contributed by a set of users.
Benhamouda, Fabrice +2 more
core +4 more sources
Reversible Data Perturbation Techniques for Multi-level Privacy-preserving Data Publication [PDF]
The amount of digital data generated in the Big Data age is increasingly rapidly. Privacy-preserving data publishing techniques based on differential privacy through data perturbation provide a safe release of datasets such that sensitive information ...
C Dwork +11 more
core +1 more source
Privacy Protection Method in the Era of Cloud Computing and Big Data
Cloud Computing has become the academic and industrial hotspot in China in recent years. Cloud Computing can help business clients manage finance more conveniently and efficiently. It can also reduce the protection of privacy.
Liu Ying
doaj +1 more source
Understanding Website Privacy Policies—A Longitudinal Analysis Using Natural Language Processing
Privacy policies are the main method for informing Internet users of how their data are collected and shared. This study aims to analyze the deficiencies of privacy policies in terms of readability, vague statements, and the use of pacifying phrases ...
Veronika Belcheva +2 more
doaj +1 more source
DP-Forward: Fine-tuning and Inference on Language Models with Differential Privacy in Forward Pass
Differentially private stochastic gradient descent (DP-SGD) adds noise to gradients in back-propagation, safeguarding training data from privacy leakage, particularly membership inference. It fails to cover (inference-time) threats like embedding inversion and sensitive attribute inference. It is also costly in storage and computation when used to fine-
Minxin Du +5 more
openaire +2 more sources
A Survey of RFID Authentication Protocols Based on Hash-Chain Method [PDF]
Security and privacy are the inherent problems in RFID communications. There are several protocols have been proposed to overcome those problems. Hash chain is commonly employed by the protocols to improve security and privacy for RFID authentication ...
Chang, Elizabeth +3 more
core +2 more sources
A Survey on Privacy Protection of Blockchain: The Technology and Application
As a kind of point-to-point distributed public ledger technology, blockchain has been widely concerned in recent years. The privacy protection of blockchain technology has always been the core issue of people's attention.
Dan Wang, Jindong Zhao, Yingjie Wang
doaj +1 more source
Towards privacy-preserving dynamic deep packet inspection over outsourced middleboxes
The prosperity of network function virtualization (NFV) pushes forward the paradigm of migrating in-house middleboxes to third-party providers, i.e., software (virtualized) middlebox services.
Chunxiao Li, Yu Guo, Xia Wang
doaj +1 more source
Forward Private Searchable Symmetric Encryption with Optimized I/O Efficiency [PDF]
Recently, several practical attacks raised serious concerns over the security of searchable encryption. The attacks have brought emphasis on forward privacy, which is the key concept behind solutions to the adaptive leakage-exploiting attacks, and will ...
Dong, Changyu +4 more
core +1 more source
Liquid biopsy enables minimally invasive, real‐time molecular profiling through analysis of circulating biomarkers in biological fluids. This Perspective highlights the importance of training pathologists through integrative educational programs, such as the European Masters in Molecular Pathology, to ensure effective and equitable implementation of ...
Marius Ilié +13 more
wiley +1 more source

