Oblivious {Multi-Party} machine learning on trusted processors
Privacy-preserving multi-party machine learning allows multiple organizations to perform
collaborative data analytics while guaranteeing the privacy of their individual datasets …
collaborative data analytics while guaranteeing the privacy of their individual datasets …
[图书][B] Methodological developments in data linkage
K Harron, H Goldstein, C Dibben - 2016 - Wiley Online Library
The increasing availability of large administrative databases for research has led to a
dramatic rise in the use of data linkage. The speed and accuracy of linkage have much …
dramatic rise in the use of data linkage. The speed and accuracy of linkage have much …
Meeting points in ridesharing: A privacy-preserving approach
Nowadays, problems of congestion in urban areas due to the massive usage of cars, last-
minute travel needs and progress in information and communication technologies have …
minute travel needs and progress in information and communication technologies have …
Outsourcing eigen-decomposition and singular value decomposition of large matrix to a public cloud
L Zhou, C Li - IEEE Access, 2016 - ieeexplore.ieee.org
Cloud computing enables customers with limited computational resources to outsource their
huge computation workloads to the cloud with massive computational power. However, in …
huge computation workloads to the cloud with massive computational power. However, in …
Efficient and privacy-preserving k-means clustering for big data mining
Recent advances in sensing and storing technologies have led to big data age where a
huge amount of data are distributed across sites to be stored and analysed. Indeed, cluster …
huge amount of data are distributed across sites to be stored and analysed. Indeed, cluster …
Location-enhanced authentication using the IoT: Because you cannot be in two places at once
User location can act as an additional factor of authentication in scenarios where physical
presence is required, such as when making in-person purchases or unlocking a vehicle …
presence is required, such as when making in-person purchases or unlocking a vehicle …
A survey of homomorphic encryption for outsourced big data computation
TS Fun, A Samsudin - KSII Transactions on Internet and Information …, 2016 - koreascience.kr
With traditional data storage solutions becoming too expensive and cumbersome to support
Big Data processing, enterprises are now starting to outsource their data requirements to …
Big Data processing, enterprises are now starting to outsource their data requirements to …
Scalable privacy-preserving linking of multiple databases using counting Bloom filters
The integration, mining, and analysis of person-specific data can provide enormous
opportunities for organizations, governments, and researchers to leverage today's massive …
opportunities for organizations, governments, and researchers to leverage today's massive …
CQSTR: Securing cross-tenant applications with cloud containers
Cloud providers are in a position to greatly improve the trust clients have in network
services: IaaS platforms can isolate services so they cannot leak data, and can help verify …
services: IaaS platforms can isolate services so they cannot leak data, and can help verify …
-SAS: Privacy-Preserving Centralized Dynamic Spectrum Access System
Centralized spectrum management is one of the key dynamic spectrum access (DSA)
mechanisms proposed to govern the spectrum sharing between government incumbent …
mechanisms proposed to govern the spectrum sharing between government incumbent …