搜索结果: 1-15 共查到“军队指挥学 privacy preserving”相关记录139条 . 查询时间(0.098 秒)
A Conditional Privacy Preserving Authentication and Multi Party Group Key Establishment Scheme for Real-Time Application in VANETs
Password Authentication VANET Group-Key generation
2019/9/19
Vehicular Ad-hoc Networks (VANETs) are a cardinal part of intelligent transportation system (ITS) which render various services in terms of traffic and transport management. The VANET is used to manag...
Privacy-preserving auditable token payments in a permissioned blockchain system
cryptographic protocols AML
2019/9/19
Token management systems were the first application of blockchain technology and are still the most widely used one. Early implementations such as Bitcoin or Ethereum provide virtually no privacy beyo...
PrivFL: Practical Privacy-preserving Federated Regressions on High-dimensional Data over Mobile Networks
Privacy-preserving computations Predictive analysis Federated learning
2019/8/30
Federated Learning (FL) enables a large number of users to jointly learn a shared machine learning (ML) model, coordinated by a centralized server, where the data is distributed across multiple device...
Traceable and linkable ring signatures, traceable range proofs and applications on regulatable privacy-preserving blockchains
regulatable blockchain privacy preserving decentralization
2019/8/19
Privacy protection has been extensively studied in the current blockchain research field. As representations, Monero and Zerocash have realized completely anonymous and amount-hiding transactions. How...
P6V2G: A Privacy-Preserving V2G Scheme for Two-Way Payments and Reputation
Vehicle-to-grid Location Privacy Provable Security
2019/7/15
The number of electric vehicles (EVs) is steadily growing. This provides a promising opportunity for balancing the smart grid of the future, because vehicle-to-grid (V2G) systems can utilize the batte...
Privacy-Preserving Classification of Personal Text Messages with Secure Multi-Party Computation: An Application to Hate-Speech Detection
cryptographic protocols SMC
2019/6/26
Classification of personal text messages has many useful applications in surveillance, e-commerce, and mental health care, to name a few. Giving applications access to personal texts can easily lead t...
New Code-Based Privacy-Preserving Cryptographic Constructions
Code-based cryptography zero-knowledge range arguments
2019/5/21
Code-based cryptography has a long history but did suffer from periods of slow development. The field has recently attracted a lot of attention as one of the major branches of post-quantum cryptograph...
On the Efficiency of Privacy-Preserving Smart Contract Systems
privacy-preserving smart contracts zk-SNARKs UC-security
2019/5/14
Along with blockchain technology, smart contracts have found intense interest in lots of practical applications. A smart contract is a mechanism involving digital assets and some parties, where the pa...
Security Analysis of Efficient Anonymous Authentication With Conditional Privacy Preserving Scheme for Vehicular Ad Hoc Networks
Vehicular ad hoc networks (VANETs) Impersonation attack Bogus message attack
2019/5/13
Protecting a driver’s privacy is one of the major concerns in vehicular ad hoc networks (VANETs). Currently, Azees et al. has proposed an efficient anonymous authentication protocol (EAAP) for VANETs....
Privacy-Preserving Network Path Validation
Network path validation Path privacy Index privacy
2019/4/23
The end-users communicating over a network path currently have no control over the path. For a better quality of service, the source node often opts for a superior (or premium) network path in order t...
Privado: Privacy-Preserving Group-based Advertising using Multiple Independent Social Network Providers
Unlinkability Privacy Advertising
2019/4/11
Online Social Networks (OSNs) offer free storage and social networking services through which users can communicate personal information with one another. The personal information of the users collect...
In this work, we examine the efficiency of protocols for secure evaluation of basic mathematical functions (sqrt,sin,arcsinsqrt,sin,arcsin, amongst others), essential to various application domains. e...
Privacy-preserving semi-parallel logistic regression training with Fully Homomorphic Encryption
fully homomorphic encryption logistic regression genome privacy
2019/2/27
Background Privacy-preserving computations on genomic data, and more generally on medical data, is a critical path technology for innovative, life-saving research to positively and equally impact the ...
Trustee: Full Privacy Preserving Vickrey Auction on top of Ethereum
Vickrey Auction Trusted Execution Environment Intel SGX
2019/2/27
The wide deployment of tokens for digital assets on top of Ethereum implies the need for powerful trading platforms. Vickrey auctions have been known to determine the real market price of items as bid...
CodedPrivateML: A Fast and Privacy-Preserving Framework for Distributed Machine Learning
privacy-preserving machine learning information-theoretic privacy
2019/2/26
How to train a machine learning model while keeping the data private and secure? We present CodedPrivateML, a fast and scalable approach to this critical problem. CodedPrivateML keeps both the data an...