Results 71 to 80 of about 33,105 (188)
In recent years, it has become easy to obtain location information quite precisely. However, the acquisition of such information has risks such as individual identification and leakage of sensitive information, so it is necessary to protect the privacy ...
A Wasef +8 more
core +1 more source
In real-world applications, commercial off-the-shelf systems are utilized for performing automated facial analysis including face recognition, emotion recognition, and attribute prediction.
Chhabra, Saheb +3 more
core +1 more source
Set intersection protocol with privacy preservation
The Private Set Intersection Protocol (PSI) is one of the fundamental primitives of secure multi-party computations. This primitive allows several parties who do not trust each other to work together to calculate the intersection of their secret sets ...
I. D. Ioganson
doaj +1 more source
Attribute-Hiding Predicate Encryption With Equality Test in Cloud Computing
Public key encryption with equality test (PKE-ET) enables anyone to perform equivalence test between two messages encrypted under distinct public keys.
Jianfei Sun +3 more
doaj +1 more source
Conditionals in Homomorphic Encryption and Machine Learning Applications [PDF]
Homomorphic encryption aims at allowing computations on encrypted data without decryption other than that of the final result. This could provide an elegant solution to the issue of privacy preservation in data-based applications, such as those using ...
Chialva, Diego, Dooms, Ann
core +1 more source
Efficient L-Diversity Algorithm for Preserving Privacy of Dynamically Published Datasets
Although most conventional methods of preserving data privacy focus on static datasets, which remain unchanged after processing, real-world datasets may be dynamically modified often.
Odsuren Temuujin +2 more
doaj +1 more source
Semi-Trusted Mixer Based Privacy Preserving Distributed Data Mining for Resource Constrained Devices [PDF]
In this paper a homomorphic privacy preserving association rule mining algorithm is proposed which can be deployed in resource constrained devices (RCD).
Kaosar, Md. Golam, Yi, Xun
core +1 more source
Secure Nearest Neighbor Query on Crowd-Sensing Data
Nearest neighbor queries are fundamental in location-based services, and secure nearest neighbor queries mainly focus on how to securely and quickly retrieve the nearest neighbor in the outsourced cloud server.
Ke Cheng, Liangmin Wang, Hong Zhong
doaj +1 more source
Bidirectional Privacy Preservation in Web Services
In web-based services, users are often required to submit personal data, which may be shared with third parties. Although privacy regulations mandate the disclosure of intended recipients in privacy policies, this does not fully alleviate users’ privacy ...
Sumit Kumar Paul, D. A. Knox
doaj +1 more source
Privacy preservation in big data:a survey
Privacy disclosure issue becomes more and more serious due to big data analysis.Privacy-preserving techniques should be conductive to the big data applications while preserving data privacy.Since big data has the characteristics of huge scale,numerous ...
Binxing FANG +3 more
doaj

