搜索结果: 1-7 共查到“军事学 Data Aggregation”相关记录7条 . 查询时间(0.046 秒)
We focus on a scenario in which a single company wishes to obtain the distribution of aggregate features, while ensuring a high level of privacy for the users. We are interested in the case where user...
Homomorphic Proxy Re-Authenticators and Applications to Verifiable Multi-User Data Aggregation
data aggregation verifiable computation homomorphic encryption
2017/2/20
We introduce the notion of homomorphic proxy re-authenticators, a tool that adds security and verifiability guarantees to multi-user data aggregation scenarios. It allows distinct sources to authentic...
Private and Dynamic Time-Series Data Aggregation with Trust Relaxation
data aggregation privacy time-series data
2016/1/23
With the advent of networking applications collecting user data on a massive scale, the privacy of individual users appears to be a major concern. The main challenge is the design of a solution that...
Privacy-Enhanced Participatory Sensing with Collusion Resistance and Data Aggregation
privacy participatory sensing collusion resistance
2016/1/9
Participatory sensing enables new paradigms and markets for information collection based on the ubiquitous availability of smartphones, but also introduces privacy challenges for participating users a...
Differentially Private Data Aggregation with Optimal Utility
Secure Multiparty Computation (SMPC) Distributed Differential Privacy Data Aggregation
2016/1/9
Computing aggregate statistics about user data is of vital importance for a
variety of services and systems, but this practice has been shown to seriously undermine
the privacy of users. Differentia...
Existing work on data collection and analysis for aggregation is mainly
focused on confidentiality issues. That is, the untrusted Aggregator learns only
the aggregation result without divulging indi...
Collaborative, Privacy-Preserving Data Aggregation at Scale
privacy-preserving collaboration Privacy-Preserving Data Aggregation malicious attack
2009/6/12
Combining and analyzing data collected at multiple locations is
critical for a wide variety of applications, such as detecting and
diagnosing malicious attacks or computing an accurate estimate of
...