نتایج جستجو برای: privacy preservation

تعداد نتایج: 116916  

2014
Avinash Kumar Singh Narayan P. Keer Anand Motwani

Privacy-preserving is one of the most important challenges in a computer world, because of the huge amount of sensitive information on the internet. The paper contains several privacy preservation techniques for data publishing in the real world. There are several privacy attacks are associate but among of them mainly two attacks are record linkage and attribute linkage. Many scientists have pr...

Journal: :World Wide Web 2021

Abstract With growing concern of data privacy violations, preservation processes become more intense. The k -anonymity method, a widely applied technique, transforms the such that publishing datasets must have at least tuples to same link-able attribute, quasi-identifiers, values. From observations, we found that, in certain domain, all quasi-identifiers datasets, can type. This type attribute ...

Journal: :International Journal of Engineering & Technology 2018

Journal: :International Journal of Computer Applications 2013

Journal: :Digital Communications and Networks 2021

Permissionless blockchain, as a kind of distributed ledger, has gained considerable attention because its openness, transparency, decentralization, and immutability. Currently, permissionless blockchain shown good application prospect in many fields, from the initial cryptocurrency to Internet Things (IoT) Vehicular Ad-Hoc Networking (VANET), which is considered beginning rewriting our digital ...

2013
Sonja Buchegger Jon Crowcroft Balachander Krishnamurthy Thorsten Strufe

This report documents the program and the outcomes of Dagstuhl Seminar 13062 “Decentralized Systems for Privacy Preservation”. In recent years, a number of concerns have risen about the existence of large, organizationally centralized online services (cloud services, online social networks, repositories, etc). The concerns include risks to users’ data from organizational failures and threats to...

2007
Jilles Vreeken Matthijs van Leeuwen Arno Siebes

Many databases will or can not be disclosed without strong guarantees that no sensitive information can be extracted. To address this concern several data perturbation techniques have been proposed. However, it has been shown that either sensitive information can still be extracted from the perturbed data with little prior knowledge, or that many patterns are lost. In this paper we show that ge...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید