Results 341 to 350 of about 1,840,684 (372)
Some of the next articles are maybe not open access.
2018
In this chapter, we illustrate main results on privacy-preserving embeddings. Here, security properties of embeddings are analyzed by considering two possible scenarios for their use. In the first case, a client submits a query containing sensitive information to a server, which should respond to the query without gaining access to the private ...
Matteo Testa +3 more
openaire +1 more source
In this chapter, we illustrate main results on privacy-preserving embeddings. Here, security properties of embeddings are analyzed by considering two possible scenarios for their use. In the first case, a client submits a query containing sensitive information to a server, which should respond to the query without gaining access to the private ...
Matteo Testa +3 more
openaire +1 more source
Practical Secure Aggregation for Privacy-Preserving Machine Learning
IACR Cryptology ePrint Archive, 2017Keith Bonawitz +8 more
semanticscholar +1 more source
SecureML: A System for Scalable Privacy-Preserving Machine Learning
IEEE Symposium on Security and Privacy, 2017Payman Mohassel, Yupeng Zhang
semanticscholar +1 more source
Privacy-Preserving Deep Learning via Additively Homomorphic Encryption
IEEE Transactions on Information Forensics and Security, 2018L. T. Phong +4 more
semanticscholar +1 more source
A Comprehensive Survey of Privacy-preserving Federated Learning
ACM Computing Surveys, 2022Xuefei Yin, Yanming Zhu, Jiankun Hu
exaly
Location Privacy-preserving Mechanisms in Location-based Services
ACM Computing Surveys, 2022Hongbo Jiang, Ping Zhao, Fanzi Zeng
exaly
Privacy-preserving federated learning for residential short-term load forecasting
Applied Energy, 2022Joaquin Delgado Fernandez +2 more
exaly
1998
One of the exciting mathematical developments of the past decade was the discovery of so-called uncrackable public key codes. These are codes with the characteristic that everyone knows the method of encryption, but the amount of calculation required for an outsider to break the code is considered beyond present computational capabilities.
openaire +1 more source
One of the exciting mathematical developments of the past decade was the discovery of so-called uncrackable public key codes. These are codes with the characteristic that everyone knows the method of encryption, but the amount of calculation required for an outsider to break the code is considered beyond present computational capabilities.
openaire +1 more source
Survey on Privacy-Preserving Techniques for Microdata Publication
ACM Computing Surveys, 2023Tânia Carvalho, Nuno Moniz, Pedro Faria
exaly
Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts
IEEE Symposium on Security and Privacy, 2016Ahmed E. Kosba +4 more
semanticscholar +1 more source

