Results 1 to 10 of about 64,505 (309)
Privacy preserving data visualizations [PDF]
Data visualizations are a valuable tool used during both statistical analysis and the interpretation of results as they graphically reveal useful information about the structure, properties and relationships between variables, which may otherwise be ...
Demetris Avraam +7 more
doaj +5 more sources
Privacy-Preserving Passive DNS [PDF]
The Domain Name System (DNS) was created to resolve the IP addresses of web servers to easily remembered names. When it was initially created, security was not a major concern; nowadays, this lack of inherent security and trust has exposed the global DNS
Pavlos Papadopoulos +4 more
doaj +3 more sources
PP-GWAS: Privacy Preserving Multi-Site Genome-wide Association Studies [PDF]
Genome-wide association studies help uncover genetic influences on complex traits and diseases. Importantly, multi-site data collaborations enhance the statistical power of these studies but pose challenges due to the sensitivity of genomic data ...
Arjhun Swaminathan +4 more
doaj +2 more sources
Privacy-Preserving Blockchain Technologies
The main characteristics of blockchains, such as security and traceability, have enabled their use in many distinct scenarios, such as the rise of new cryptocurrencies and decentralized applications (dApps).
Dalton Cézane Gomes Valadares +4 more
doaj +4 more sources
Privacy-Preserving Data Mining and Analytics in Big Data [PDF]
Privacy concerns have gotten more attention as Big Data has spread. The difficulties of striking a balance between the value of data and individual privacy have led to the emergence of privacy-preserving data mining and analytics approaches as a crucial ...
Basha M. John +6 more
doaj +1 more source
Privacy Preserving Data Mining Using Random Decision Tree Over Partition Data: Survey [PDF]
The development of data mining with data protection and data utility can manage distributed data efficiently. This paper revisits the concepts and techniques of privacy-preserving Random Decision Tree (RDT).
Othman Nashwan Adnan +1 more
doaj +1 more source
A Privacy-Preserving Scheme for Smart Grid Using Trusted Execution Environment
The increasing transformation from the legacy power grid to the smart grid brings new opportunities and challenges to power system operations. Bidirectional communications between home-area devices and the distribution system empower smart grid ...
Mete Akgun +2 more
doaj +1 more source
Polar Codes for Module-LWE Public Key Encryption: The Case of Kyber
In modern society, the Internet is one of the most used means of communication. Thus, secure information transfer is inevitably of major importance.
Iason Papadopoulos, Jiabo Wang
doaj +1 more source
Review of Privacy-preserving Mechanisms in Crowdsensing [PDF]
In recent years,the rapid popularity of intelligent terminals has greatly promoted the development of crowdsensing service paradigm,which integrates data collection,analysis and processing.As a necessary base to ensure the safe operation of services and ...
LI Li, HE Xin, HAN Zhi-jie
doaj +1 more source
Privacy Preserving Image Registration
v4 Accepted at Medical Image Computing and Computer Assisted Intervention (2022) 130 ...
Riccardo Taiello +4 more
openaire +5 more sources

