Results 251 to 260 of about 278,242 (279)
Some of the next articles are maybe not open access.

Privacy-Preserving Embeddings

2018
In this chapter, we illustrate main results on privacy-preserving embeddings. Here, security properties of embeddings are analyzed by considering two possible scenarios for their use. In the first case, a client submits a query containing sensitive information to a server, which should respond to the query without gaining access to the private ...
Matteo Testa   +3 more
openaire   +1 more source

A Comprehensive Survey of Privacy-preserving Federated Learning

ACM Computing Surveys, 2022
Xuefei Yin, Yanming Zhu, Jiankun Hu
exaly  

Location Privacy-preserving Mechanisms in Location-based Services

ACM Computing Surveys, 2022
Hongbo Jiang, Ping Zhao, Fanzi Zeng
exaly  

Privacy-preserving federated learning for residential short-term load forecasting

Applied Energy, 2022
Joaquin Delgado Fernandez   +2 more
exaly  

Privacy-Preserving Protocols

1998
One of the exciting mathematical developments of the past decade was the discovery of so-called uncrackable public key codes. These are codes with the characteristic that everyone knows the method of encryption, but the amount of calculation required for an outsider to break the code is considered beyond present computational capabilities.
openaire   +1 more source

Preserving Privacy

2007
Gerard Rushton   +2 more
openaire   +1 more source

Survey on Privacy-Preserving Techniques for Microdata Publication

ACM Computing Surveys, 2023
Tânia Carvalho, Nuno Moniz, Pedro Faria
exaly  

FRUIT: A Blockchain-Based Efficient and Privacy-Preserving Quality-Aware Incentive Scheme

IEEE Journal on Selected Areas in Communications, 2022
Chuan Zhang, Liehuang Zhu, Weiting Zhang
exaly  

Privacy-Preserving Schemes for Ad Hoc Social Networks: A Survey

IEEE Communications Surveys and Tutorials, 2017
Mohamed Amine Ferrag   +2 more
exaly  

Home - About - Disclaimer - Privacy