搜索结果: 1-7 共查到“军事学 Data Aggregation”相关记录7条 . 查询时间(0.078 秒)
Private Data Aggregation on a Budget
multi-party computation privacy mobile
font style='font-size:12px;'>
2017/7/6
We focus on a scenario in which a single company wishes to obtain the distribution of aggregate features, while ensuring a high level of privacy for the users. We are interested in the case where user...
Homomorphic Proxy Re-Authenticators and Applications to Verifiable Multi-User Data Aggregation
data aggregation verifiable computation homomorphic encryption
font style='font-size:12px;'>
2017/2/20
We introduce the notion of homomorphic proxy re-authenticators, a tool that adds security and verifiability guarantees to multi-user data aggregation scenarios. It allows distinct sources to authentic...
Private and Dynamic Time-Series Data Aggregation with Trust Relaxation
data aggregation privacy time-series data
font style='font-size:12px;'>
2016/1/23
With the advent of networking applications collecting user data on a massive scale, the privacy of individual users appears to be a major concern. The main challenge is the design of a solution that...
Privacy-Enhanced Participatory Sensing with Collusion Resistance and Data Aggregation
privacy participatory sensing collusion resistance
font style='font-size:12px;'>
2016/1/9
Participatory sensing enables new paradigms and markets for information collection based on the ubiquitous availability of smartphones, but also introduces privacy challenges for participating users a...
Differentially Private Data Aggregation with Optimal Utility
Secure Multiparty Computation (SMPC) Distributed Differential Privacy Data Aggregation
font style='font-size:12px;'>
2016/1/9
Computing aggregate statistics about user data is of vital importance for a
variety of services and systems, but this practice has been shown to seriously undermine
the privacy of users. Differentia...
PUDA ?Privacy and Unforgeability for Data Aggregation
Privacy Security Data Analysis
font style='font-size:12px;'>
2015/12/29
Existing work on data collection and analysis for aggregation is mainly
focused on confidentiality issues. That is, the untrusted Aggregator learns only
the aggregation result without divulging indi...
Collaborative, Privacy-Preserving Data Aggregation at Scale
privacy-preserving collaboration Privacy-Preserving Data Aggregation malicious attack
font style='font-size:12px;'>
2009/6/12
Combining and analyzing data collected at multiple locations is
critical for a wide variety of applications, such as detecting and
diagnosing malicious attacks or computing an accurate estimate of
...