Results 21 to 30 of about 278,242 (279)

Efficient Privacy-Preserving K-Means Clustering from Secret-Sharing-Based Secure Three-Party Computation

open access: yesEntropy, 2022
Privacy-preserving machine learning has become an important study at present due to privacy policies. However, the efficiency gap between the plain-text algorithm and its privacy-preserving version still exists.
Weiming Wei, Chunming Tang, Yucheng Chen
doaj   +1 more source

Personalized privacy preservation [PDF]

open access: yesProceedings of the 2006 ACM SIGMOD international conference on Management of data, 2006
We study generalization for preserving privacy in publication of sensitive data. The existing methods focus on a universal approach that exerts the same amount of preservation for all persons, with-out catering for their concrete needs. The consequence is that we may be offering insufficient protection to a subset of people, while applying excessive ...
Yufei Tao, Xiaokui Xiao
openaire   +1 more source

Privacy-Preserving Pandemic Monitoring [PDF]

open access: yes, 2021
The recent COVID-19 pandemic has presented a significant challenge for health organisations around the world in providing treatment and ensuring public health safety. While this has highlighted the importance of data sharing amongst them, it has also highlighted the importance of ensuring patient data privacy in doing so.
Win, Thu Yein, Tianfield, Hugo
openaire   +2 more sources

Privacy-Preserving Bin-Packing With Differential Privacy

open access: yesIEEE Open Journal of Signal Processing, 2022
With the emerging of e-commerce, package theft is at a high level: It is reported that 1.7 million packages are stolen or lost every day in the U.S. in 2020, which costs $25 million every day for the lost packages and the service.
Tianyu Li   +2 more
doaj   +1 more source

Privacy Preserving Data Mining [PDF]

open access: yesJournal of Cryptology, 2000
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Lindell, Yehuda, Pinkas, Benny
openaire   +2 more sources

Privacy-Preserving Data Mashup [PDF]

open access: yes2011 IEEE International Conference on Advanced Information Networking and Applications, 2011
Data Mashup is a special class of mashup application that combines information on the fly from multiple data sources to respond to transient business needs. Mashing up data requires an important programming skill on the side of mashups' creators, and involves handling many challenging privacy and security concerns raised by data providers.
Barhamgi, Mahmoud   +3 more
openaire   +1 more source

Privacy-preserving association rule mining via multi-key fully homomorphic encryption

open access: yesJournal of King Saud University: Computer and Information Sciences, 2023
Association rule mining is an efficient method to mine the association relationships between different items from large transaction databases, but is vulnerable to privacy leakage as operates over users’ sensitive data directly.
Peiheng Jia   +4 more
doaj   +1 more source

ZOCB and ZOTR: Tweakable Blockcipher Modes for Authenticated Encryption with Full Absorption

open access: yesIACR Transactions on Symmetric Cryptology, 2019
We define ZOCB and ZOTR for nonce-based authenticated encryption with associated data, and analyze their provable security. These schemes use a tweakable blockcipher (TBC) as the underlying primitive, and fully utilize its input to process a plaintext ...
Zhenzhen Bao   +2 more
doaj   +1 more source

Development and Analysis of Deterministic Privacy-Preserving Policies Using Non-Stochastic Information Theory [PDF]

open access: yes, 2019
A deterministic privacy metric using non-stochastic information theory is developed. Particularly, minimax information is used to construct a measure of information leakage, which is inversely proportional to the measure of privacy.
Farokhi, Farhad
core   +2 more sources

Obfuscation for Privacy-preserving Syntactic Parsing [PDF]

open access: yes, 2020
The goal of homomorphic encryption is to encrypt data such that another party can operate on it without being explicitly exposed to the content of the original data.
Cohen, Shay B.   +3 more
core   +2 more sources

Home - About - Disclaimer - Privacy