Lawful Interception (LI) is a legal obligation of Communication Service
...
Homomorphic encryption (HE), which allows computations on encrypted data...
Principal component analysis (PCA) is an essential algorithm for
dimensi...
Homomorphic encryption, which enables the execution of arithmetic operat...
We present RHODE, a novel system that enables privacy-preserving trainin...
Wearable devices such as smartwatches, fitness trackers, and blood-press...
Tree-based models are among the most efficient machine learning techniqu...
Providing provenance in scientific workflows is essential for reproducib...
In this paper, we address the problem of privacy-preserving training and...
In the digital era, users share their personal data with service provide...
This document describes and analyzes a system for secure and
privacy-pre...
In this paper, we address the problem of privacy-preserving distributed
...
Aggregate location statistics are used in a number of mobility analytics...
Collaborative predictive blacklisting (CPB) allows to forecast future at...
With current technology, a number of entities have access to user mobili...
Collaborative security initiatives are increasingly often advocated to
i...