• Sharemind

  • Referenced in 16 articles [sw22617]
  • Sharemind: A framework for fast privacy-preserving computations. Gathering and processing sensitive data ... Sharemind—is a virtual machine for privacy-preserving data processing that relies on share computing...
  • TASTY

  • Referenced in 19 articles [sw09865]
  • generate efficient secure protocols for many privacy-preserving applications where we consider the use cases...
  • ADSNARK

  • Referenced in 8 articles [sw22496]
  • ADSNARK: nearly practical and privacy-preserving proofs on authenticated data. We study the problem ... privacy-preserving proofs on authenticated data, where a party receives data from a trusted source ... computations over authenticated data in a privacy-preserving manner. ADSNARK improves significantly over state...
  • FRAPP

  • Referenced in 3 articles [sw08861]
  • FRAPP: a framework for high-accuracy privacy-preserving mining. To preserve client privacy ... design of perturbation mechanisms for privacy-preserving mining. Specifically, FRAPP is used to demonstrate that ... substantially enhancing the accuracy even under strict privacy requirements. We also propose a novel perturbation ... general-purpose random-perturbation-based privacy-preserving mining technique, is evaluated specifically with regard...
  • Rmind

  • Referenced in 2 articles [sw21135]
  • privacy-preserving statistical analysis. Implementations of simple statistical analysis functions have been published ... used statistical analysis functions in the privacy-preserving setting including simple statistics, t-test ... regression. We give descriptions of the privacy-preserving algorithms and benchmark results that show...
  • POSEIDON

  • Referenced in 1 article [sw40779]
  • POSEIDON: Privacy-Preserving Federated Neural Network Learning. In this paper, we address the problem ... privacy-preserving training and evaluation of neural networks in an N-party, federated learning setting ... kind in the regime of privacy-preserving neural network training. It employs multiparty lattice-based...
  • ZIDS

  • Referenced in 1 article [sw33563]
  • ZIDS: A privacy-preserving intrusion detection system using secure two-party computation protocols. We introduce ... solve this problem, we reduce privacy-preserving intrusion detection to an instance of secure ... provide a full implementation of our privacy-preserving system that includes optimizations that lead...
  • LP3Verif

  • Referenced in 1 article [sw41471]
  • location privacy properties of location privacy-preserving mechanisms (LPPM). Location privacy-preserving mechanisms (LPPM...
  • BLAZE

  • Referenced in 1 article [sw37634]
  • Practical Lattice-Based Blind Signatures for Privacy-Preserving Applications. Blind signatures constitute basic cryptographic ingredients ... privacy-preserving applications such as anonymous credentials, e-voting, and Bitcoin. Despite the great variety...
  • Chiron

  • Referenced in 1 article [sw32566]
  • Chiron: Privacy-preserving Machine Learning as a Service. Major cloud operators offer machine learning ... evaluate Chiron, a system for privacy-preserving machine learning as a service. First, Chiron conceals...
  • WebGLORE

  • Referenced in 1 article [sw23475]
  • free web service that enables privacy-preserving construction of a global logistic regression model from...
  • zksk

  • Referenced in 1 article [sw30788]
  • essential building block in many privacy-preserving systems. However, implementing these proofs is tedious...
  • PrivEdge

  • Referenced in 1 article [sw32540]
  • propose PrivEdge, a technique for privacy-preserving MLaaS that safeguards the privacy of users...
  • TenSEAL

  • Referenced in 1 article [sw38098]
  • TenSEAL, an open-source library for Privacy-Preserving Machine Learning using Homomorphic Encryption that...
  • FedGL

  • Referenced in 1 article [sw41836]
  • flow and share in a privacy-preserving manner, thus alleviating the heterogeneity and utilizing...
  • AudiTEE

  • Referenced in 0 articles [sw39962]
  • AudiTEE: Efficient, General-Purpose and Privacy-Preserving Audit for Distributed Ledgers. Privacy-preservation and effective ... ledger in a generic, efficient, and privacy-preserving manner. AudiTEE leverages Trusted Execution Environment...
  • zkledger

  • Referenced in 0 articles [sw39963]
  • zkledger: privacy-preserving auditing for distributed ledgers. This paper presents zkLedger, the first system...
  • MapReduce

  • Referenced in 263 articles [sw00546]
  • MapReduce is a new parallel programming model initially...
  • Matlab

  • Referenced in 13488 articles [sw00558]
  • MATLAB® is a high-level language and interactive...
  • TOMP

  • Referenced in 32 articles [sw00971]
  • Algorithm 733: TOMP - Fortran modules for optimal control...