Results 251 to 260 of about 278,242 (279)
Some of the next articles are maybe not open access.
2018
In this chapter, we illustrate main results on privacy-preserving embeddings. Here, security properties of embeddings are analyzed by considering two possible scenarios for their use. In the first case, a client submits a query containing sensitive information to a server, which should respond to the query without gaining access to the private ...
Matteo Testa +3 more
openaire +1 more source
In this chapter, we illustrate main results on privacy-preserving embeddings. Here, security properties of embeddings are analyzed by considering two possible scenarios for their use. In the first case, a client submits a query containing sensitive information to a server, which should respond to the query without gaining access to the private ...
Matteo Testa +3 more
openaire +1 more source
A Comprehensive Survey of Privacy-preserving Federated Learning
ACM Computing Surveys, 2022Xuefei Yin, Yanming Zhu, Jiankun Hu
exaly
Location Privacy-preserving Mechanisms in Location-based Services
ACM Computing Surveys, 2022Hongbo Jiang, Ping Zhao, Fanzi Zeng
exaly
Privacy-preserving federated learning for residential short-term load forecasting
Applied Energy, 2022Joaquin Delgado Fernandez +2 more
exaly
1998
One of the exciting mathematical developments of the past decade was the discovery of so-called uncrackable public key codes. These are codes with the characteristic that everyone knows the method of encryption, but the amount of calculation required for an outsider to break the code is considered beyond present computational capabilities.
openaire +1 more source
One of the exciting mathematical developments of the past decade was the discovery of so-called uncrackable public key codes. These are codes with the characteristic that everyone knows the method of encryption, but the amount of calculation required for an outsider to break the code is considered beyond present computational capabilities.
openaire +1 more source
Survey on Privacy-Preserving Techniques for Microdata Publication
ACM Computing Surveys, 2023Tânia Carvalho, Nuno Moniz, Pedro Faria
exaly
FRUIT: A Blockchain-Based Efficient and Privacy-Preserving Quality-Aware Incentive Scheme
IEEE Journal on Selected Areas in Communications, 2022Chuan Zhang, Liehuang Zhu, Weiting Zhang
exaly
Privacy-Preserving Schemes for Ad Hoc Social Networks: A Survey
IEEE Communications Surveys and Tutorials, 2017Mohamed Amine Ferrag +2 more
exaly

