Results 241 to 250 of about 194,648 (280)
Some of the next articles are maybe not open access.
Econometrics with Privacy Preservation
Operations Research, 2019Summary: Many data are sensitive in areas such as finance, economics, and other social sciences. We propose an ER (encryption and recovery) algorithm that allows a central administration to do statistical inference based on the encrypted data, while still preserving each party's privacy even for a colluding majority in the presence of cyber attack.
Ning Cai, Steven Kou
openaire +3 more sources
Privacy-Preserving Outsourced Profiling
2010 IEEE 12th Conference on Commerce and Enterprise Computing, 2010Personalized services attract high-value customers. Knowing the preferences and habits of an individual customer, it is possible to offer to that customer well customized and adapted services, matching his needs and desires. This is advantageous for the entity offering the service (e.g., a retailer) as well, as it helps in creating additional sales or ...
Biswas D., Haller S., Kerschbaum F.
openaire +1 more source
Privacy-preserving fingercode authentication
Proceedings of the 12th ACM workshop on Multimedia and security, 2010We present a privacy preserving protocol for fingerprint-based authentication. We consider a scenario where a client equipped with a fingerprint reader is interested into learning if the acquired fingerprint belongs to the database of authorized entities managed by a server.
Mauro Barni +10 more
openaire +2 more sources
Privacy-preserving deep learning
2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton), 2015Deep learning based on artificial neural networks is a very popular approach to modeling, classifying, and recognizing complex data such as images, speech, and text. The unprecedented accuracy of deep learning methods has turned them into the foundation of new AI-based services on the Internet.
Reza Shokri, Vitaly Shmatikov
openaire +1 more source
Privacy-Preserving Smart Metering
Proceedings of the 10th annual ACM workshop on Privacy in the electronic society, 2011Smart grid proposals threaten user privacy by potentially disclosing fine-grained consumption data to utility providers, primarily for time-of-use billing, but also for profiling, settlement, forecasting, tariff and energy efficiency advice. We propose a privacy-preserving protocol for general calculations on fine-grained meter readings, while keeping ...
Alfredo Rial, George Danezis
openaire +1 more source
Proceedings of the 9th Symposium on Identity and Trust on the Internet, 2010
This paper describes and contrasts two families of schemes that enable a user to purchase digital content without revealing to anyone what item he has purchased. One of the basic schemes is based on anonymous cash, and the other on blind decryption.
Radia Perlman +2 more
openaire +1 more source
This paper describes and contrasts two families of schemes that enable a user to purchase digital content without revealing to anyone what item he has purchased. One of the basic schemes is based on anonymous cash, and the other on blind decryption.
Radia Perlman +2 more
openaire +1 more source
2023
Privacy-preserving computing aims to protect the personal information of users while capitalizing on the possibilities unlocked by big data. This practical introduction for students, researchers, and industry practitioners is the first cohesive and systematic presentation of the field's advances over four decades.
Chen, Kai, Yang, Qiang
openaire +2 more sources
Privacy-preserving computing aims to protect the personal information of users while capitalizing on the possibilities unlocked by big data. This practical introduction for students, researchers, and industry practitioners is the first cohesive and systematic presentation of the field's advances over four decades.
Chen, Kai, Yang, Qiang
openaire +2 more sources
Proceedings of the 2008 ACM symposium on Applied computing, 2008
The current Internet architecture was designed at a time when many of the current network applications did not even exist. As a result, it has become increasingly difficult to deploy new and secure services on the Internet. Hence, a new Internet architecture is required to address the security and usability issues that affect the current Internet.
Dijiang Huang +2 more
openaire +1 more source
The current Internet architecture was designed at a time when many of the current network applications did not even exist. As a result, it has become increasingly difficult to deploy new and secure services on the Internet. Hence, a new Internet architecture is required to address the security and usability issues that affect the current Internet.
Dijiang Huang +2 more
openaire +1 more source
Communications of the ACM, 2020
Can you answer a poll without revealing your true preferences and have the results of the poll still be accurate?
openaire +1 more source
Can you answer a poll without revealing your true preferences and have the results of the poll still be accurate?
openaire +1 more source
Proceedings of the Twelfth ACM International Conference on Web Search and Data Mining, 2019
The goals of learning from user data and preserving user privacy are often considered to be in conflict. This presentation will demonstrate that there are contexts when provable privacy guarantees can be an enabler for better web search and data mining (WSDM), and can empower researchers hoping to change the world by mining sensitive user data.
openaire +1 more source
The goals of learning from user data and preserving user privacy are often considered to be in conflict. This presentation will demonstrate that there are contexts when provable privacy guarantees can be an enabler for better web search and data mining (WSDM), and can empower researchers hoping to change the world by mining sensitive user data.
openaire +1 more source

