intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

Privacy preservation

Xem 1-20 trên 34 kết quả Privacy preservation
  • Ebook Network security illustrated: Part 1 includes contents: Part I managing security, part II outsourcing options, part III reserving rights, part IV determining identity, part V preserving privacy, part VI connecting networks.

    pdf232p longtimenosee05 31-03-2024 0 0   Download

  • This approach required a significant amount of time for preprocessing and formulating a constraint satisfaction problem (CSP). To address this problem, we proposed a new algorithm based on a hash data structure which performs more quickly in itemsets filtering and problem modeling. Experiment evaluations are conducted on real world and synthetic datasets.

    pdf11p visystrom 22-11-2023 6 5   Download

  • This book presents a sampling of work in the field. The primary target is the researcher or student who wishes to work in privacy-preserving data mining; the goal is to give a background on approaches along with details showing how to develop specific solutions within each approach. The book is organized much like a typical data mining text, with discussion of privacy-preserving solutions to particular data mining tasks.

    pdf123p haojiubujain06 23-10-2023 8 3   Download

  • Ebook Security in wireless mesh networks: Part 1 includes contents: Chapter 1 an introduction to wireless mesh networks; chapter 2 mesh networking in wireless PANs, LANs,MANs, and WANs; chapter 3 attacks and security mechanisms; chapter 4 intrusion detection in wireless mesh networks; chapter 5 secure routing in wireless mesh networks; chapter 6 hop integrity in wireless mesh networks; chapter 7 privacy preservation in wireless mesh networks; chapter 8 providing authentication, trust, and privacy in wireless mesh networks; chapter 9 non-interactive key establishment in wireless mesh network...

    pdf357p haojiubujain06 06-09-2023 8 5   Download

  • This study provides an implementation of the extended Euclidean algorithm to find secret keys based on RSA cryptography and hopes that it can be of help to experts in the field of information security.

    pdf11p viberkshire 09-08-2023 7 5   Download

  • Decentralized privacy-preserving predictive modeling enables multiple institutions to learn a more generalizable model on healthcare or genomic data by sharing the partially trained models instead of patientlevel data, while avoiding risks such as single point of control. State-of-the-art blockchain-based methods remove the “server” role but can be less accurate than models that rely on a server.

    pdf12p visteverogers 24-06-2023 7 2   Download

  • Location data are becoming easier to obtain and are now bundled with other metadata in a variety of biomedical research applications. At the same time, the level of sophistication required to protect patient privacy is also increasing. In this article, we provide guidance for institutional review boards (IRBs) to make informed decisions about privacy protections in protocols involving location data.

    pdf5p visteverogers 24-06-2023 4 2   Download

  • This article describes the implementation of a privacy-preserving record linkage (PPRL) solution across PCORnetVR , the National Patient-Centered Clinical Research Network. Material and Methods: Using a PPRL solution from Datavant, we quantified the degree of patient overlap across the network and report a de-duplicated analysis of the demographic and clinical characteristics of the PCORnet population.

    pdf9p vighostrider 25-05-2023 4 2   Download

  • In this study, we focus on developing a hierarchical approach to inherit the benefits of the privacy-preserving methods, retain the advantages of adopting blockchain, and address practical concerns on a research network-of-networks.

    pdf12p vighostrider 25-05-2023 11 2   Download

  • Ebook Investigating computer-related crime: Handbook for corporate investigators - Part 2 presents the following content: Chapter 10 - handling the crime in progress, chapter 11 - "it never happened" - cover-ups are common, chapter 12 - involving the authorities, chapter 13 - when an investigation can't continue, chapter 14 - building a corporate cyber "SWAT Team", chapter 15 - privacy and computer crime, chapter 16 - preserving evidence - basic concepts, chapter 17 - collecting evidence - first steps, chapter 18 - searching for hidden information, chapter 19 - handling floppy disks.

    pdf116p runthenight08 12-04-2023 12 4   Download

  • In this paper, a novel privacy preserving method for data publication is proposed based on conditional probability distribution and machine learning techniques, which can achieve different prior beliefs for different transactions.

    pdf15p guernsey 28-12-2021 6 0   Download

  • The current and future applications of genomic data may raise ethical and privacy concerns. Processing and storing of this data introduce a risk of abuse by potential offenders since the human genome contains sensitive personal information. For this reason, we have developed a privacy-preserving method, named Varlock providing secure storage of sequenced genomic data. We used a public set of population allele frequencies to mask the personal alleles detected in genomic reads.

    pdf13p vilarryellison 29-10-2021 9 1   Download

  • In this paper, a solution for privacy preservation and data security is presented. Privacy over the internet can be defined as the ability to decide what information one discloses or withholds about a person over the internet, who can access such information and for what reason a person’s information may or may not be accessed.

    pdf4p phanngocminhtam 14-09-2021 15 4   Download

  • This paper proposes a security framework for Internet of Things (IoT) based on blockchain. The solution provides the two features: (1) Access control for IoT devices, which allows users to pay a fee to the device’s owner to access the device for a certain period of time.

    pdf9p viaespa2711 31-07-2021 26 3   Download

  • . In this paper, we propose a grid-based approach as well as an algorithm to guarantee k-anonymity, a well-known privacy protection approach, in a location database. To do this, we assume that the service server will provide services but in a defined area and the grid will cover the area in which the service server takes effect, Then, the user's location will be hidden in an anonymization area. The anonymization area will be chosen by cells that forms a rectangle area so that this area contains at least k distinct users.

    pdf13p trinhthamhodang9 04-12-2020 10 2   Download

  • Privacy-preserving frequency mining is a quite simple technique, but it is very useful in privacy-preserving machine learning and data mining. In this paper, we construct an elliptic curve analog of the ElGamal system-based protocol for privacy-preserving frequency mining in fully distributed setting.

    pdf8p tamynhan9 02-12-2020 15 2   Download

  • In this paper, we firstly state the secure three-vector product computation problem and develop protocols called tree-vector products to solve this problem. Our protocols are developed based on some basic protocols and their security properties is validated base on the composition theorem for the semi-honest model [9]. We then use the proposed protocols to address a focus problem of privacy preserving multivariate classification.

    pdf9p tamynhan8 04-11-2020 10 1   Download

  • In this paper, we consider a new scenario for privacy-preserving data mining called two-part partitioned record model (TPR) and find solutions for a family of frequency-based learning algorithms in TPR model. In TPR, the dataset is distributed across a large number of users in which each record is owned by two different users, one user only knows the values for a subset of attributes and the other knows the values for the remaining attributes.

    pdf18p tamynhan8 04-11-2020 9 1   Download

  • The deployment of Genome-wide association studies (GWASs) requires genomic information of a large population to produce reliable results. This raises significant privacy concerns, making people hesitate to contribute their genetic information to such studies.

    pdf12p vicoachella2711 27-10-2020 7 1   Download

  • In the past few years, privacy issues in data mining have received considerable attention in the data mining literature. However, the problem of data security cannot simply be solved by restricting data collection or against unauthorized access, it should be dealt with by providing solutions that not only protect sensitive information, but also not affect to the accuracy of the results in data mining and not violate the sensitive knowledge related with individual privacy or competitive advantage in businesses.

    pdf18p 12120609 23-03-2020 20 2   Download

CHỦ ĐỀ BẠN MUỐN TÌM

ADSENSE

nocache searchPhinxDoc

 

Đồng bộ tài khoản
2=>2