Results 41 to 50 of about 672,157 (285)

A New Framework for Privacy-Preserving Aggregation of Time-Series Data [PDF]

open access: yes, 2016
International audienceAggregator-oblivious encryption is a useful notion put forward by Shi et al. in 2011 that allows an untrusted aggregator to periodically compute an aggregate value over encrypted data contributed by a set of users.
Benhamouda, Fabrice   +2 more
core   +4 more sources

Reversible Data Perturbation Techniques for Multi-level Privacy-preserving Data Publication [PDF]

open access: yes, 2018
The amount of digital data generated in the Big Data age is increasingly rapidly. Privacy-preserving data publishing techniques based on differential privacy through data perturbation provide a safe release of datasets such that sensitive information ...
C Dwork   +11 more
core   +1 more source

Privacy Protection Method in the Era of Cloud Computing and Big Data

open access: yesMATEC Web of Conferences, 2015
Cloud Computing has become the academic and industrial hotspot in China in recent years. Cloud Computing can help business clients manage finance more conveniently and efficiently. It can also reduce the protection of privacy.
Liu Ying
doaj   +1 more source

Understanding Website Privacy Policies—A Longitudinal Analysis Using Natural Language Processing

open access: yesInformation, 2023
Privacy policies are the main method for informing Internet users of how their data are collected and shared. This study aims to analyze the deficiencies of privacy policies in terms of readability, vague statements, and the use of pacifying phrases ...
Veronika Belcheva   +2 more
doaj   +1 more source

DP-Forward: Fine-tuning and Inference on Language Models with Differential Privacy in Forward Pass

open access: yesProceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
Differentially private stochastic gradient descent (DP-SGD) adds noise to gradients in back-propagation, safeguarding training data from privacy leakage, particularly membership inference. It fails to cover (inference-time) threats like embedding inversion and sensitive attribute inference. It is also costly in storage and computation when used to fine-
Minxin Du   +5 more
openaire   +2 more sources

A Survey of RFID Authentication Protocols Based on Hash-Chain Method [PDF]

open access: yes, 2008
Security and privacy are the inherent problems in RFID communications. There are several protocols have been proposed to overcome those problems. Hash chain is commonly employed by the protocols to improve security and privacy for RFID authentication ...
Chang, Elizabeth   +3 more
core   +2 more sources

A Survey on Privacy Protection of Blockchain: The Technology and Application

open access: yesIEEE Access, 2020
As a kind of point-to-point distributed public ledger technology, blockchain has been widely concerned in recent years. The privacy protection of blockchain technology has always been the core issue of people's attention.
Dan Wang, Jindong Zhao, Yingjie Wang
doaj   +1 more source

Towards privacy-preserving dynamic deep packet inspection over outsourced middleboxes

open access: yesHigh-Confidence Computing, 2022
The prosperity of network function virtualization (NFV) pushes forward the paradigm of migrating in-house middleboxes to third-party providers, i.e., software (virtualized) middlebox services.
Chunxiao Li, Yu Guo, Xia Wang
doaj   +1 more source

Forward Private Searchable Symmetric Encryption with Optimized I/O Efficiency [PDF]

open access: yes, 2017
Recently, several practical attacks raised serious concerns over the security of searchable encryption. The attacks have brought emphasis on forward privacy, which is the key concept behind solutions to the adaptive leakage-exploiting attacks, and will ...
Dong, Changyu   +4 more
core   +1 more source

Perspectives in educating molecular pathologists on liquid biopsy: Toward integrative, equitable, and decentralized precision oncology

open access: yesMolecular Oncology, EarlyView.
Liquid biopsy enables minimally invasive, real‐time molecular profiling through analysis of circulating biomarkers in biological fluids. This Perspective highlights the importance of training pathologists through integrative educational programs, such as the European Masters in Molecular Pathology, to ensure effective and equitable implementation of ...
Marius Ilié   +13 more
wiley   +1 more source

Home - About - Disclaimer - Privacy