Results 31 to 40 of about 278,242 (279)

VirtualIdentity : privacy preserving user profiling [PDF]

open access: yes, 2016
User profiling from user generated content (UGC) is a common practice that supports the business models of many social media companies. Existing systems require that the UGC is fully exposed to the module that constructs the user profiles.
De Cock, Martine   +7 more
core   +2 more sources

Privacy Preserving Average Consensus [PDF]

open access: yesIEEE Transactions on Automatic Control, 2014
Average consensus is a widely used algorithm for distributed computing and control, where all the agents in the network constantly communicate and update their states in order to achieve an agreement. This approach could result in an undesirable disclosure of information on the initial state of agent i to the other agents.
Mo, Yilin, Murray, Richard M.
openaire   +3 more sources

Boomerang Connectivity Table Revisited. Application to SKINNY and AES

open access: yesIACR Transactions on Symmetric Cryptology, 2019
The boomerang attack is a variant of differential cryptanalysis which regards a block cipher E as the composition of two sub-ciphers, i.e., E = E1 o E0, and which constructs distinguishers for E with probability p2q2 by combining differential trails for ...
Ling Song, Xianrui Qin, Lei Hu
doaj   +1 more source

The Novel Location Privacy-Preserving CKD for Mobile Crowdsourcing Systems

open access: yesIEEE Access, 2018
With the development of mobile devices, mobile crowdsourcing has become the research hotspot in mobile crowd sensing networks (MCSS). How to protect the location privacy of mobile user in location-based services is a key problem in MCSS.
Zhongyang Chi   +3 more
doaj   +1 more source

Concentrated Differential Privacy: Simplifications, Extensions, and Lower Bounds [PDF]

open access: yes, 2016
"Concentrated differential privacy" was recently introduced by Dwork and Rothblum as a relaxation of differential privacy, which permits sharper analyses of many privacy-preserving computations.
A Beimel   +7 more
core   +2 more sources

Privacy-preserving Linear Programming [PDF]

open access: yes, 2018
A Book ...
Hong, Yuan   +3 more
openaire   +3 more sources

Privacy-Preserving Monotonicity of Differential Privacy Mechanisms

open access: yesApplied Sciences, 2018
Differential privacy mechanisms can offer a trade-off between privacy and utility by using privacy metrics and utility metrics. The trade-off of differential privacy shows that one thing increases and another decreases in terms of privacy metrics and ...
Hai Liu   +5 more
doaj   +1 more source

Privacy preservation by disassociation [PDF]

open access: yesProceedings of the VLDB Endowment, 2012
In this work, we focus on protection against identity disclosure in the publication of sparse multidimensional data. Existing multidimensional anonymization techniques (a) protect the privacy of users either by altering the set of quasi-identifiers of the original data (e.g., by generalization or suppression) or by ...
Terrovitis, M   +3 more
openaire   +3 more sources

Privacy-preserving machine learning based on secure three-party computations

open access: yesБезопасность информационных технологий, 2022
The paper is devoted to the analysis of privacy-preserving machine learning systems based on the concept of secure three-party computations. After general information about the purposes of secure multi-party computations and privacy-preserving machine ...
Sergey V. Zapechnikov
doaj   +1 more source

PEIGEN – a Platform for Evaluation, Implementation, and Generation of S-boxes

open access: yesIACR Transactions on Symmetric Cryptology, 2019
In this paper, a platform named PEIGEN is presented to evaluate security, find efficient software/hardware implementations, and generate cryptographic S-boxes.
Zhenzhen Bao   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy