Results 251 to 260 of about 195,399 (280)
Some of the next articles are maybe not open access.
Privacy Preserving Tâtonnement
2014Leon Walras’ theory of general equilibrium put forth the notion of tâtonnement as a process by which equilibrium prices are determined. Recently, Cole and Fleischer provided tâtonnement algorithms for both the classic One-Time and Ongoing Markets with guaranteed bounds for convergence to equilibrium prices. However, in order to reach equilibrium, trade
John Ross Wallrabenstein, Chris Clifton
openaire +1 more source
2018
In this chapter, we illustrate main results on privacy-preserving embeddings. Here, security properties of embeddings are analyzed by considering two possible scenarios for their use. In the first case, a client submits a query containing sensitive information to a server, which should respond to the query without gaining access to the private ...
Matteo Testa +3 more
openaire +1 more source
In this chapter, we illustrate main results on privacy-preserving embeddings. Here, security properties of embeddings are analyzed by considering two possible scenarios for their use. In the first case, a client submits a query containing sensitive information to a server, which should respond to the query without gaining access to the private ...
Matteo Testa +3 more
openaire +1 more source
Survey on Multi-Access Edge Computing Security and Privacy
IEEE Communications Surveys and Tutorials, 2021Pasika Ranaweera +2 more
exaly
Differential Privacy Techniques for Cyber Physical Systems: A Survey
IEEE Communications Surveys and Tutorials, 2020Muneeb Ul Hassan +2 more
exaly
A Survey on Metaverse: Fundamentals, Security, and Privacy
IEEE Communications Surveys and Tutorials, 2023Yuntao Wang, Zhou, Ning Zhang
exaly
1998
One of the exciting mathematical developments of the past decade was the discovery of so-called uncrackable public key codes. These are codes with the characteristic that everyone knows the method of encryption, but the amount of calculation required for an outsider to break the code is considered beyond present computational capabilities.
openaire +1 more source
One of the exciting mathematical developments of the past decade was the discovery of so-called uncrackable public key codes. These are codes with the characteristic that everyone knows the method of encryption, but the amount of calculation required for an outsider to break the code is considered beyond present computational capabilities.
openaire +1 more source
Security and Privacy for 6G: A Survey on Prospective Technologies and Challenges
IEEE Communications Surveys and Tutorials, 2021Van-Linh Nguyen +2 more
exaly
A Comprehensive Survey of Privacy-preserving Federated Learning
ACM Computing Surveys, 2022Xuefei Yin, Yanming Zhu, Jiankun Hu
exaly

