Results 31 to 40 of about 278,242 (279)
VirtualIdentity : privacy preserving user profiling [PDF]
User profiling from user generated content (UGC) is a common practice that supports the business models of many social media companies. Existing systems require that the UGC is fully exposed to the module that constructs the user profiles.
De Cock, Martine +7 more
core +2 more sources
Privacy Preserving Average Consensus [PDF]
Average consensus is a widely used algorithm for distributed computing and control, where all the agents in the network constantly communicate and update their states in order to achieve an agreement. This approach could result in an undesirable disclosure of information on the initial state of agent i to the other agents.
Mo, Yilin, Murray, Richard M.
openaire +3 more sources
Boomerang Connectivity Table Revisited. Application to SKINNY and AES
The boomerang attack is a variant of differential cryptanalysis which regards a block cipher E as the composition of two sub-ciphers, i.e., E = E1 o E0, and which constructs distinguishers for E with probability p2q2 by combining differential trails for ...
Ling Song, Xianrui Qin, Lei Hu
doaj +1 more source
The Novel Location Privacy-Preserving CKD for Mobile Crowdsourcing Systems
With the development of mobile devices, mobile crowdsourcing has become the research hotspot in mobile crowd sensing networks (MCSS). How to protect the location privacy of mobile user in location-based services is a key problem in MCSS.
Zhongyang Chi +3 more
doaj +1 more source
Concentrated Differential Privacy: Simplifications, Extensions, and Lower Bounds [PDF]
"Concentrated differential privacy" was recently introduced by Dwork and Rothblum as a relaxation of differential privacy, which permits sharper analyses of many privacy-preserving computations.
A Beimel +7 more
core +2 more sources
Privacy-preserving Linear Programming [PDF]
A Book ...
Hong, Yuan +3 more
openaire +3 more sources
Privacy-Preserving Monotonicity of Differential Privacy Mechanisms
Differential privacy mechanisms can offer a trade-off between privacy and utility by using privacy metrics and utility metrics. The trade-off of differential privacy shows that one thing increases and another decreases in terms of privacy metrics and ...
Hai Liu +5 more
doaj +1 more source
Privacy preservation by disassociation [PDF]
In this work, we focus on protection against identity disclosure in the publication of sparse multidimensional data. Existing multidimensional anonymization techniques (a) protect the privacy of users either by altering the set of quasi-identifiers of the original data (e.g., by generalization or suppression) or by ...
Terrovitis, M +3 more
openaire +3 more sources
Privacy-preserving machine learning based on secure three-party computations
The paper is devoted to the analysis of privacy-preserving machine learning systems based on the concept of secure three-party computations. After general information about the purposes of secure multi-party computations and privacy-preserving machine ...
Sergey V. Zapechnikov
doaj +1 more source
PEIGEN – a Platform for Evaluation, Implementation, and Generation of S-boxes
In this paper, a platform named PEIGEN is presented to evaluate security, find efficient software/hardware implementations, and generate cryptographic S-boxes.
Zhenzhen Bao +3 more
doaj +1 more source

