Results 251 to 260 of about 194,648 (280)
Some of the next articles are maybe not open access.
Privacy Preserving Tâtonnement
2014Leon Walras’ theory of general equilibrium put forth the notion of tâtonnement as a process by which equilibrium prices are determined. Recently, Cole and Fleischer provided tâtonnement algorithms for both the classic One-Time and Ongoing Markets with guaranteed bounds for convergence to equilibrium prices. However, in order to reach equilibrium, trade
John Ross Wallrabenstein, Chris Clifton
openaire +1 more source
2018
In this chapter, we illustrate main results on privacy-preserving embeddings. Here, security properties of embeddings are analyzed by considering two possible scenarios for their use. In the first case, a client submits a query containing sensitive information to a server, which should respond to the query without gaining access to the private ...
Matteo Testa +3 more
openaire +1 more source
In this chapter, we illustrate main results on privacy-preserving embeddings. Here, security properties of embeddings are analyzed by considering two possible scenarios for their use. In the first case, a client submits a query containing sensitive information to a server, which should respond to the query without gaining access to the private ...
Matteo Testa +3 more
openaire +1 more source
A Comprehensive Survey of Privacy-preserving Federated Learning
ACM Computing Surveys, 2022Xuefei Yin, Yanming Zhu, Jiankun Hu
exaly
A Survey on Metaverse: Fundamentals, Security, and Privacy
IEEE Communications Surveys and Tutorials, 2023Yuntao Wang, Zhou, Ning Zhang
exaly
When Machine Learning Meets Privacy in 6G: A Survey
IEEE Communications Surveys and Tutorials, 2020Yuanyuan Sun, Jiajia Liu, Jiadai Wang
exaly
1998
One of the exciting mathematical developments of the past decade was the discovery of so-called uncrackable public key codes. These are codes with the characteristic that everyone knows the method of encryption, but the amount of calculation required for an outsider to break the code is considered beyond present computational capabilities.
openaire +1 more source
One of the exciting mathematical developments of the past decade was the discovery of so-called uncrackable public key codes. These are codes with the characteristic that everyone knows the method of encryption, but the amount of calculation required for an outsider to break the code is considered beyond present computational capabilities.
openaire +1 more source
A Survey on Differential Privacy for Unstructured Data Content
ACM Computing Surveys, 2022Jinjun Chen
exaly

