A privacy preserved and credible network protocol

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Lightweight Privacy Preserved Buyer Seller Watermarking Protocol Based on Priced Oblivious Transfer

Advent of Internet has resulted in e-commerce replacing traditional selling of digital products (such as songs, videos,movies, software, books, documents, images, etc.) through shops. This mode of sale can bring the product price down as infrastructure cost in setting up shops and retail chain is reduced. On downside, however, this may increase problem of piracy as digital data can be easily co...

متن کامل

A Random Matrix Approach to Differential Privacy and Structure Preserved Social Network Graph Publishing

Online social networks are being increasingly used for analyzing various societal phenomena such as epidemiology, information dissemination, marketing and sentiment flow. Popular analysis techniques such as clustering and influential node analysis, require the computation of eigenvectors of the real graph’s adjacency matrix. Recent de-anonymization attacks on Netflix and AOL datasets show that ...

متن کامل

Privacy and Regression Model Preserved Learning

Sensitive data such as medical records and business reports usually contains valuable information that can be used to build prediction models. However, designing learning models by directly using sensitive data might result in severe privacy and copyright issues. In this paper, we propose a novel matrix completion based framework that aims to tackle two challenging issues simultaneously: i) han...

متن کامل

Towards Credible and Efficient Network Simulation Experiments

Despite of even higher performance computers, quantitative steady-state simulation of even a moderate complex system takes very long time. There is always a necessity of efficient procedures that can control the runlength of stochastic simulation experiments. This paper compares two sequential batching-based procedures for estimating steadystate mean under Multiple Replications in Parallel. A s...

متن کامل

Privacy Preserved and Secured Reliable Routing Protocol for Wireless Mesh Networks

Privacy preservation and security provision against internal attacks in wireless mesh networks (WMNs) are more demanding than in wired networks due to the open nature and mobility of certain nodes in the network. Several schemes have been proposed to preserve privacy and provide security in WMNs. To provide complete privacy protection in WMNs, the properties of unobservability, unlinkability, a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Parallel and Distributed Computing

سال: 2019

ISSN: 0743-7315

DOI: 10.1016/j.jpdc.2019.06.002