Results 71 to 80 of about 33,105 (188)

When and where do you want to hide? Recommendation of location privacy preferences with local differential privacy

open access: yes, 2019
In recent years, it has become easy to obtain location information quite precisely. However, the acquisition of such information has risks such as individual identification and leakage of sensitive information, so it is necessary to protect the privacy ...
A Wasef   +8 more
core   +1 more source

Data Fine-tuning

open access: yes, 2018
In real-world applications, commercial off-the-shelf systems are utilized for performing automated facial analysis including face recognition, emotion recognition, and attribute prediction.
Chhabra, Saheb   +3 more
core   +1 more source

Set intersection protocol with privacy preservation

open access: yesНаучно-технический вестник информационных технологий, механики и оптики
The Private Set Intersection Protocol (PSI) is one of the fundamental primitives of secure multi-party computations. This primitive allows several parties who do not trust each other to work together to calculate the intersection of their secret sets ...
I. D. Ioganson
doaj   +1 more source

Attribute-Hiding Predicate Encryption With Equality Test in Cloud Computing

open access: yesIEEE Access, 2018
Public key encryption with equality test (PKE-ET) enables anyone to perform equivalence test between two messages encrypted under distinct public keys.
Jianfei Sun   +3 more
doaj   +1 more source

Conditionals in Homomorphic Encryption and Machine Learning Applications [PDF]

open access: yes, 2018
Homomorphic encryption aims at allowing computations on encrypted data without decryption other than that of the final result. This could provide an elegant solution to the issue of privacy preservation in data-based applications, such as those using ...
Chialva, Diego, Dooms, Ann
core   +1 more source

Efficient L-Diversity Algorithm for Preserving Privacy of Dynamically Published Datasets

open access: yesIEEE Access, 2019
Although most conventional methods of preserving data privacy focus on static datasets, which remain unchanged after processing, real-world datasets may be dynamically modified often.
Odsuren Temuujin   +2 more
doaj   +1 more source

Semi-Trusted Mixer Based Privacy Preserving Distributed Data Mining for Resource Constrained Devices [PDF]

open access: yes, 2010
In this paper a homomorphic privacy preserving association rule mining algorithm is proposed which can be deployed in resource constrained devices (RCD).
Kaosar, Md. Golam, Yi, Xun
core   +1 more source

Secure Nearest Neighbor Query on Crowd-Sensing Data

open access: yesSensors, 2016
Nearest neighbor queries are fundamental in location-based services, and secure nearest neighbor queries mainly focus on how to securely and quickly retrieve the nearest neighbor in the outsourced cloud server.
Ke Cheng, Liangmin Wang, Hong Zhong
doaj   +1 more source

Bidirectional Privacy Preservation in Web Services

open access: yesComputers
In web-based services, users are often required to submit personal data, which may be shared with third parties. Although privacy regulations mandate the disclosure of intended recipients in privacy policies, this does not fully alleviate users’ privacy ...
Sumit Kumar Paul, D. A. Knox
doaj   +1 more source

Privacy preservation in big data:a survey

open access: yes大数据, 2016
Privacy disclosure issue becomes more and more serious due to big data analysis.Privacy-preserving techniques should be conductive to the big data applications while preserving data privacy.Since big data has the characteristics of huge scale,numerous ...
Binxing FANG   +3 more
doaj  

Home - About - Disclaimer - Privacy