Results 11 to 20 of about 64,505 (309)

Efficient Privacy-Preserving K-Means Clustering from Secret-Sharing-Based Secure Three-Party Computation

open access: yesEntropy, 2022
Privacy-preserving machine learning has become an important study at present due to privacy policies. However, the efficiency gap between the plain-text algorithm and its privacy-preserving version still exists.
Weiming Wei, Chunming Tang, Yucheng Chen
doaj   +1 more source

Personalized privacy preservation [PDF]

open access: yesProceedings of the 2006 ACM SIGMOD international conference on Management of data, 2006
We study generalization for preserving privacy in publication of sensitive data. The existing methods focus on a universal approach that exerts the same amount of preservation for all persons, with-out catering for their concrete needs. The consequence is that we may be offering insufficient protection to a subset of people, while applying excessive ...
Yufei Tao, Xiaokui Xiao
openaire   +1 more source

Privacy-Preserving Pandemic Monitoring [PDF]

open access: yes, 2021
The recent COVID-19 pandemic has presented a significant challenge for health organisations around the world in providing treatment and ensuring public health safety. While this has highlighted the importance of data sharing amongst them, it has also highlighted the importance of ensuring patient data privacy in doing so.
Win, Thu Yein, Tianfield, Hugo
openaire   +2 more sources

Privacy-Preserving Bin-Packing With Differential Privacy

open access: yesIEEE Open Journal of Signal Processing, 2022
With the emerging of e-commerce, package theft is at a high level: It is reported that 1.7 million packages are stolen or lost every day in the U.S. in 2020, which costs $25 million every day for the lost packages and the service.
Tianyu Li   +2 more
doaj   +1 more source

Privacy Preserving Data Mining [PDF]

open access: yesJournal of Cryptology, 2000
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Lindell, Yehuda, Pinkas, Benny
openaire   +2 more sources

Privacy-Preserving Data Mashup [PDF]

open access: yes2011 IEEE International Conference on Advanced Information Networking and Applications, 2011
Data Mashup is a special class of mashup application that combines information on the fly from multiple data sources to respond to transient business needs. Mashing up data requires an important programming skill on the side of mashups' creators, and involves handling many challenging privacy and security concerns raised by data providers.
Barhamgi, Mahmoud   +3 more
openaire   +1 more source

Privacy-preserving association rule mining via multi-key fully homomorphic encryption

open access: yesJournal of King Saud University: Computer and Information Sciences, 2023
Association rule mining is an efficient method to mine the association relationships between different items from large transaction databases, but is vulnerable to privacy leakage as operates over users’ sensitive data directly.
Peiheng Jia   +4 more
doaj   +1 more source

ZOCB and ZOTR: Tweakable Blockcipher Modes for Authenticated Encryption with Full Absorption

open access: yesIACR Transactions on Symmetric Cryptology, 2019
We define ZOCB and ZOTR for nonce-based authenticated encryption with associated data, and analyze their provable security. These schemes use a tweakable blockcipher (TBC) as the underlying primitive, and fully utilize its input to process a plaintext ...
Zhenzhen Bao   +2 more
doaj   +1 more source

Privacy Preserving Average Consensus [PDF]

open access: yesIEEE Transactions on Automatic Control, 2014
Average consensus is a widely used algorithm for distributed computing and control, where all the agents in the network constantly communicate and update their states in order to achieve an agreement. This approach could result in an undesirable disclosure of information on the initial state of agent i to the other agents.
Mo, Yilin, Murray, Richard M.
openaire   +3 more sources

Boomerang Connectivity Table Revisited. Application to SKINNY and AES

open access: yesIACR Transactions on Symmetric Cryptology, 2019
The boomerang attack is a variant of differential cryptanalysis which regards a block cipher E as the composition of two sub-ciphers, i.e., E = E1 o E0, and which constructs distinguishers for E with probability p2q2 by combining differential trails for ...
Ling Song, Xianrui Qin, Lei Hu
doaj   +1 more source

Home - About - Disclaimer - Privacy