-
1Table of Contents: “…Preliminary of Differential Privacy -- Differentially Private Data Publishing: Settings…”
Full Text via HEAL-Link
Electronic eBook -
2Published 2016Table of Contents: “… -- Cross&Clean: Amortized Garbled Circuits With Constant Overhead -- Differential Privacy -- Separating…”
Full Text via HEAL-Link
Electronic eBook -
3Published 2018Table of Contents: “…Security and privacy in machine learning -- Differential privacy -- Cyber security research.…”
Full Text via HEAL-Link
Electronic eBook -
4Published 2015Table of Contents: “…Pseudorandom Functions and Applications -- Proofs and Verifiable Computation -- Differential…”
Full Text via HEAL-Link
Electronic eBook -
5Published 2012Table of Contents: “… protection: case studies -- Spatial data protection -- Differential privacy -- On-line databases and remote…”
Full Text via HEAL-Link
Electronic eBook -
6Published 2017Table of Contents: “… of Differential Privacy.…”
Full Text via HEAL-Link
Electronic eBook -
7“… αποκεντροποιημένο (decentralized matrix factorization with differential privacy) τρόπο εκπαίδευσης των μοντέλων…”
Get full text
7 -
8Published 2018Table of Contents: “…-preserving encryption -- Cryptoanalysis -- Searchable encryption and differential privacy -- Secret sharing…”
Full Text via HEAL-Link
Electronic eBook -
9Secure Data Management 9th VLDB Workshop, SDM 2012, Istanbul, Turkey, August 27, 2012. Proceedings /Published 2012Table of Contents: “…Tradeoff Analysis of Relational Database Storage of Privacy Preferences.-Differential Privacy…”
Full Text via HEAL-Link
Electronic eBook -
10Published 2019Table of Contents: “… -- Differential privacy -- Bounds for symmetric cryptography -- Non-malleability -- Blockchain and consensus…”
Full Text via HEAL-Link
Electronic eBook -
11by Pan, Miao, Pan, Miao, Wang, Jingyi, Errapotu, Sai Mounika, Zhang, Xinyue, Ding, Jiahao, Han, ZhuTable of Contents: “… Preservation of Users' Energy Profile -- Chapter 5 Caching with Users' Differential Privacy Preservation…”
Published 2019
Full Text via HEAL-Link
Electronic eBook -
12Published 2019Table of Contents: “… -- Differential privacy -- Bounds for symmetric cryptography -- Non-malleability -- Blockchain and consensus…”
Full Text via HEAL-Link
Electronic eBook -
13Published 2019Table of Contents: “… -- Differential privacy -- Bounds for symmetric cryptography -- Non-malleability -- Blockchain and consensus…”
Full Text via HEAL-Link
Electronic eBook -
14Published 2017Table of Contents: “…. Mr Y: the Emergence of Externalities in Differential Privacy -- High-Utility Database Anonymization…”
Full Text via HEAL-Link
Electronic eBook -
15Published 2018Table of Contents: “…-preserving encryption -- Cryptoanalysis -- Searchable encryption and differential privacy -- Secret sharing…”
Full Text via HEAL-Link
Electronic eBook -
16Published 2018Table of Contents: “…-preserving encryption -- Cryptoanalysis -- Searchable encryption and differential privacy -- Secret sharing…”
Full Text via HEAL-Link
Electronic eBook -
17Published 2024“… on preserving differential privacy protection. This framework is distributed to multiple edge robots in each…”
Get full text
-
18
-
19
-
20