1,655 results on '"Domingo-Ferrer, Josep"'
Search Results
52. Efficient Detection of Byzantine Attacks in Federated Learning Using Last Layer Biases
53. Flexible Attribute-Based Encryption Applicable to Secure E-Healthcare Records
54. Privacy by design in big data: An overview of privacy enhancing technologies in the era of big data analytics
55. t-Closeness through Microaggregation: Strict Privacy with Enhanced Utility Preservation
56. Utility-Preserving Differentially Private Data Releases Via Individual Ranking Microaggregation
57. Supplementary Materials for 'How to Avoid Reidentification with Proper Anonymization'- Comment on 'Unique in the shopping mall: on the reidentifiability of credit card metadata'
58. On the Security of Privacy-Preserving Vehicular Communication Authentication with Hierarchical Aggregation and Fast Response
59. On the Security of MTA-OTIBASs (Multiple-TA One-Time Identity-Based Aggregate Signatures)
60. Co-Utility: Self-Enforcing Protocols without Coordination Mechanisms
61. Flexible and Robust Privacy-Preserving Implicit Authentication
62. New Directions in Anonymization: Permutation Paradigm, Verifiability by Subjects and Intruders, Transparency to Users
63. Privacy and Data Protection by Design - from policy to engineering
64. Co-utile Ridesharing
65. Co-utile Enforcement of Digital Oblivion
66. Self-enforcing Collaborative Anonymization via Co-utility
67. Problems in the Undertakings of the Collaborative Economy: Co-utile Solutions
68. Co-utile Privacy-Aware P2P Content Distribution
69. Co-utile P2P Anonymous Keyword Search
70. Incentive-Based Co-utility: Co-utile Reputation Management
71. Co-utility: Designing Self-enforcing and Mutually Beneficial Protocols
72. Multiparty Computation with Statistical Input Confidentiality via Randomized Response
73. On the Privacy Guarantees of Synthetic Data: A Reassessment from the Maximum-Knowledge Attacker Perspective
74. Group Discounts Compatible with Buyer Privacy
75. Privacy-preserving Loyalty Programs
76. Machine Learning Explainability Through Comprehensible Decision Trees
77. Personal Big Data, GDPR and Anonymization
78. Mitigating the Curse of Dimensionality in Data Anonymization
79. Efficient Near-Optimal Variable-Size Microaggregation
80. Machine learning explainability via microaggregation and shallow decision trees
81. Differentially private data publishing via cross-moment microaggregation
82. LFighter: Defending against the label-flipping attack in federated learning
83. Explaining Image Misclassification in Deep Learning via Adversarial Examples
84. Towards Machine Learning-Assisted Output Checking for Statistical Disclosure Control
85. Outsourcing analyses on privacy-protected multivariate categorical data stored in untrusted clouds
86. Ethical Value-Centric Cybersecurity: A Methodology Based on a Value Graph
87. Privacy-Preserving Trust Management Mechanisms from Private Matching Schemes
88. Inference Control in Statistical Databases
89. Record Matching
90. Privacy-Preserving and Co-utile Distributed Social Credit
91. Anonymization of Unstructured Data via Named-Entity Recognition
92. FuturICT - The Road towards Ethical ICT
93. Privacy-preserving cloud computing on sensitive data: A survey of methods, products and challenges
94. Marginality: a numerical mapping for enhanced treatment of nominal and hierarchical attributes
95. Beyond k-Anonymity: l-Diversity and t-Closeness
96. Differential Privacy by Multivariate Microaggregation
97. Differential Privacy
98. t-Closeness Through Microaggregation
99. Quantifying Disclosure Risk: Record Linkage
100. Anonymization Methods for Microdata
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.