Review of privacy computing techniques for multi-party data fusion analysis
In the data era, threats to personal privacy information in ubiquitous sharing environments are widespread, such as apps frequently collecting personal information beyond scope, and big data-enabled price discrimination against frequent customers. The need for multi-party privacy computing for cros...
Saved in:
Main Authors: | LIU Shenglong, HUANG Xiuli, JIANG Yiwen, JIANG Jiawei, TIAN Yuechi, ZHOU Zejun, NIU Ben |
---|---|
Format: | Article |
Language: | English |
Published: |
POSTS&TELECOM PRESS Co., LTD
2024-12-01
|
Series: | 网络与信息安全学报 |
Subjects: | |
Online Access: | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2024078 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Privacy in the Internet: Myth or reality
by: Mikarić Bratislav, et al.
Published: (2016-01-01) -
Privacy policy compliance detection and analysis based on knowledge graph
by: ZHANG Xiheng, et al.
Published: (2024-12-01) -
An improved Fully Homomorphic Encryption model based on N-Primes
by: Mohammed Anwar Mohammed, et al.
Published: (2019-10-01) -
Solving Truthfulness-Privacy Trade-Off in Mixed Data Outsourcing by Using Data Balancing and Attribute Correlation-Aware Differential Privacy
by: Abdul Majeed, et al.
Published: (2025-01-01) -
Detecting privacy compliance of mobile applications from the perspective of the "minimum necessary" principle
by: YU Peihou, et al.
Published: (2024-12-01)