نتایج جستجو برای: privacy preserving

تعداد نتایج: 90476  

2016
V. Baby

In various distributed data mining settings, leakage of the real data is not adequate because of privacy issues. To overcome this problem, numerous privacy-preserving distributed data mining practices have been suggested such as protect privacy of their data by perturbing it with a randomization algorithm and using cryptographic techniques. In this paper, we review and provide extensive survey ...

2014
R. Indhumathi S. Mohana Priya

This paper mainly deals with the issue of privacy preserving in data mining while collaborating n number of parties and trying to maintain confidentiality of all data providers details while collaborating their database. Here two type of attacks are addressed “insider attack” and “outsider attack”. In insider attack, the data providers use their own records and try to retrieve other data provid...

2014
Snehal M. Gaikwad Vidya Dhamdhere

This paper represents a review of privacy preserving techniques in wireless sensor network. Wireless sensor networks are not secure. To preserve privacy of wireless sensor network various techniques are discovered. A lot of work has been done to address challenges faced to preserve privacy of wireless sensor network. In this paper we represent a research on privacy preserving techniques used in...

2014
Aritra Dasgupta Eamonn Maguire Alfie Abdul-Rahman Min Chen

In this paper, we reflect on the use of visualization techniques for analyzing electronic health record data with privacy concerns. Privacy-preserving data visualization is a relatively new area of research compared to the more established research areas of privacy-preserving data publishing and data mining. We describe the opportunities and challenges for privacy-preserving visualization of el...

Journal: :Michigan Technology Law Review 2019

Journal: :International Journal of Computer and Communication Engineering 2014

Journal: :Proceedings on Privacy Enhancing Technologies 2023

Digital Covid certificates are the first widely deployed end-user cryptographic certificates. For service providers, such as airlines or event ticket vendors, that needed to check their (global) customers satisfy certain health policies, verification of was challenging though - not because cryptography involved, but due multitude issuers, different certificate types and evolving nature country-...

Journal: :Transportation Research Procedia 2017

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید