Results 291 to 300 of about 126,150 (308)
Some of the next articles are maybe not open access.

Privacy-preserving fingercode authentication

Proceedings of the 12th ACM workshop on Multimedia and security, 2010
We present a privacy preserving protocol for fingerprint-based authentication. We consider a scenario where a client equipped with a fingerprint reader is interested into learning if the acquired fingerprint belongs to the database of authorized entities managed by a server.
Mauro Barni   +10 more
openaire   +2 more sources

Privacy-preserving deep learning

2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton), 2015
Deep learning based on artificial neural networks is a very popular approach to modeling, classifying, and recognizing complex data such as images, speech, and text. The unprecedented accuracy of deep learning methods has turned them into the foundation of new AI-based services on the Internet.
Reza Shokri, Vitaly Shmatikov
openaire   +1 more source

Privacy-Preserving Smart Metering

Proceedings of the 10th annual ACM workshop on Privacy in the electronic society, 2011
Smart grid proposals threaten user privacy by potentially disclosing fine-grained consumption data to utility providers, primarily for time-of-use billing, but also for profiling, settlement, forecasting, tariff and energy efficiency advice. We propose a privacy-preserving protocol for general calculations on fine-grained meter readings, while keeping ...
Alfredo Rial, George Danezis
openaire   +1 more source

Privacy-preserving DRM

Proceedings of the 9th Symposium on Identity and Trust on the Internet, 2010
This paper describes and contrasts two families of schemes that enable a user to purchase digital content without revealing to anyone what item he has purchased. One of the basic schemes is based on anonymous cash, and the other on blind decryption.
Radia Perlman   +2 more
openaire   +1 more source

Privacy-preserving Computing

2023
Privacy-preserving computing aims to protect the personal information of users while capitalizing on the possibilities unlocked by big data. This practical introduction for students, researchers, and industry practitioners is the first cohesive and systematic presentation of the field's advances over four decades.
Chen, Kai, Yang, Qiang
openaire   +2 more sources

Privacy preservation services

Proceedings of the 2008 ACM symposium on Applied computing, 2008
The current Internet architecture was designed at a time when many of the current network applications did not even exist. As a result, it has become increasingly difficult to deploy new and secure services on the Internet. Hence, a new Internet architecture is required to address the security and usability issues that affect the current Internet.
Dijiang Huang   +2 more
openaire   +1 more source

Privacy-preserving polling

Communications of the ACM, 2020
Can you answer a poll without revealing your true preferences and have the results of the poll still be accurate?
openaire   +1 more source

Privacy-Preserving WSDM

Proceedings of the Twelfth ACM International Conference on Web Search and Data Mining, 2019
The goals of learning from user data and preserving user privacy are often considered to be in conflict. This presentation will demonstrate that there are contexts when provable privacy guarantees can be an enabler for better web search and data mining (WSDM), and can empower researchers hoping to change the world by mining sensitive user data.
openaire   +1 more source

Privacy Preserving Tâtonnement

2014
Leon Walras’ theory of general equilibrium put forth the notion of tâtonnement as a process by which equilibrium prices are determined. Recently, Cole and Fleischer provided tâtonnement algorithms for both the classic One-Time and Ongoing Markets with guaranteed bounds for convergence to equilibrium prices. However, in order to reach equilibrium, trade
John Ross Wallrabenstein, Chris Clifton
openaire   +1 more source

Privacy-Preserving Embeddings

2018
In this chapter, we illustrate main results on privacy-preserving embeddings. Here, security properties of embeddings are analyzed by considering two possible scenarios for their use. In the first case, a client submits a query containing sensitive information to a server, which should respond to the query without gaining access to the private ...
Matteo Testa   +3 more
openaire   +1 more source

Home - About - Disclaimer - Privacy