Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "privacy preserving" wg kryterium: Wszystkie pola


Wyświetlanie 1-6 z 6
Tytuł:
Robust distributed privacy-preserving secure aggregation in vehicular communication
Autorzy:
Qin, B.
Wu, Q.
Domingo-Ferrer, J.
Susilo, W.
Powiązania:
https://bibliotekanauki.pl/articles/206240.pdf
Data publikacji:
2012
Wydawca:
Polska Akademia Nauk. Instytut Badań Systemowych PAN
Tematy:
authentication
vehicle privacy
data aggregation
VANETs
Opis:
Vehicular ad hoc networks (VANETs), formed by computers embedded in vehicles and the traffic infrastructure, are expected to develop in the near future to improve traffic safety and efficiency. To this end, VANETs should be designed to be resistant against various abuses and attacks. In this paper, we first review the existing proposals to provide security, privacy, and data aggregation in vehicle-to-vehicle communication. We then address the fundamental issue of achieving these conflicting properties in a unified solution, having observed that separate efforts cannot fulfill the VANET design objectives. A set of new mechanisms are suggested for efficiently managing identities and securely compressing cryptographic witnesses, which are among the major obstacles to the deployment of strong security mechanisms in VANETs. Finally, we employ the standard threshold cryptographic technology to improve the basic protocol with robustness.
Źródło:
Control and Cybernetics; 2012, 41, 2; 277-296
0324-8569
Pojawia się w:
Control and Cybernetics
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Privacy-preserving data mining, sharing and publishing
Autorzy:
Pasierb, K.
Kajdanowicz, T.
Kazienko, P.
Powiązania:
https://bibliotekanauki.pl/articles/333538.pdf
Data publikacji:
2011
Wydawca:
Uniwersytet Śląski. Wydział Informatyki i Nauki o Materiałach. Instytut Informatyki. Zakład Systemów Komputerowych
Tematy:
elektroniczna dokumentacja medyczna
udostępnianie danych medycznych
eksploracji danych medycznych
poufność danych
anonimowość
electronic medical record
medical data sharing
medical data mining
data confidentiality
privacy-preserving methods
anonymity
Opis:
The goal of the paper is to present different approaches to privacy-preserving data sharing and publishing in the context of e-health care systems. In particular, the literature review on technical issues in privacy assurance and current real-life high complexity implementation of medical system that assumes proper data sharing mechanisms are presented in the paper.
Źródło:
Journal of Medical Informatics & Technologies; 2011, 18; 69-76
1642-6037
Pojawia się w:
Journal of Medical Informatics & Technologies
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Privacy Preserving and Secure Iris-Based Biometric Authentication for Computer Networks
Autorzy:
Strzelczyk, P.
Powiązania:
https://bibliotekanauki.pl/articles/308388.pdf
Data publikacji:
2011
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
authentication
biometrics
iris recognition
privacy preserving
Opis:
The iris biometrics is considered one of the most accurate and robust methods of the identity verification. The unique iris features of an individual can be presented in a compact binary form which can be easily compared with the reference template to confirm identity. However in contrast to passwords and PINs biometric authentication factors cannot be revoked and changed as they are inherently connected to our characteristics. Once the biometric information is compromised or disclosed it became useless for the purpose of authentication. Therefore there is a need to perform iris features matching without revealing the features itself and the reference template. We propose an extension of the standard irisbased verification protocol which introduces a features and template locking mechanism, which guarantee that no sensitive information is exposed. Presented solutions can be easily integrated into authentication mechanisms used in modern computer networks.
Źródło:
Journal of Telecommunications and Information Technology; 2011, 4; 115-118
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
A Survey on Privacy Preserving Data Mining
Autorzy:
Bharanya, S.
Amudha, P.
Powiązania:
https://bibliotekanauki.pl/articles/1193548.pdf
Data publikacji:
2016
Wydawca:
Przedsiębiorstwo Wydawnictw Naukowych Darwin / Scientific Publishing House DARWIN
Tematy:
Data mining
Frequent pattern mining
Perturbation
Privacy-preserving data mining
Opis:
Privacy-preserving data mining has been considered widely because of the wide propagation of sensitive information over internet. A number of algorithmic techniques have been designed for privacy-preserving data mining that includes the state-of-the-art method. Privacy preserving data mining has become progressively popular because it allows sharing of confidential sensitive data for analysis purposes. It is important to maintain a ratio between privacy protection and knowledge discovery. To solve such problems many algorithms are proposed by various authors across the world. The main objective of this paper is to study various Privacy preserving data mining techniques and algorithms used for mining the item sets.
Źródło:
World Scientific News; 2016, 41; 68-75
2392-2192
Pojawia się w:
World Scientific News
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
A Novel Graph-modification Technique for User Privacy-preserving on Social Networks
Autorzy:
Hamideh Erfani, Seyedeh
Mortazavi, Reza
Powiązania:
https://bibliotekanauki.pl/articles/958060.pdf
Data publikacji:
2019
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
graph-modification
social networks
privacypreserving publication of data
graph anonymization
database security
Opis:
The growing popularity of social networks and the increasing need for publishing related data mean that protection of privacy becomes an important and challenging problem in social networks. This paper describes the (k,l k,l k,l)-anonymity model used for social network graph anonymization. The method is based on edge addition and is utility-aware, i.e. it is designed to generate a graph that is similar to the original one. Different strategies are evaluated to this end and the results are compared based on common utility metrics. The outputs confirm that the na¨ıve idea of adding some random or even minimum number of possible edges does not always produce useful anonymized social network graphs, thus creating some interesting alternatives for graph anonymization techniques.
Źródło:
Journal of Telecommunications and Information Technology; 2019, 3; 27-38
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
A Multi-Party Scheme for Privacy : Preserving Clustering
Autorzy:
Zhan, J.
Matwin, S.
Chang, L.
Powiązania:
https://bibliotekanauki.pl/articles/93043.pdf
Data publikacji:
2006
Wydawca:
Uniwersytet Przyrodniczo-Humanistyczny w Siedlcach
Tematy:
privacy
security
clustering
Opis:
Preserving data privacy while conducting data clustering among multiple parties is a demanding problem. We address this challenging problem in the following scenario: without disclosing their private data to each other, multiple parties, each having a private data set, want to collaboratively conduct k-medoids clustering. To tackle this problem, we develop secure protocols for multiple parties to achieve this dual goal. The solution is distributed, i.e., there is no central, trusted party having access to all the data. Instead, we define a protocol using homomorphic encryption and digital envelope techniques to exchange the data while keeping it private.
Źródło:
Studia Informatica : systems and information technology; 2006, 1(7); 217-232
1731-2264
Pojawia się w:
Studia Informatica : systems and information technology
Dostawca treści:
Biblioteka Nauki
Artykuł
    Wyświetlanie 1-6 z 6

    Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies