Privacy-preserving data aggregation with probabilistic range validation
From MaRDI portal
Publication:2117046
DOI10.1007/978-3-030-78375-4_4zbMATH Open1489.68089OpenAlexW3093826765MaRDI QIDQ2117046FDOQ2117046
Authors: F. W. Dekker, Zekeriya Erkin
Publication date: 21 March 2022
Full work available at URL: http://resolver.tudelft.nl/uuid:65980240-b9b6-4bf1-b434-d1db757e5401
Recommendations
- Privacy-Preserving Stream Aggregation with Fault Tolerance
- A distributed protocol for privacy preserving aggregation with non-permanent participants
- Practical fault-tolerant data aggregation
- How to deal with malicious users in privacy‐preserving distributed data mining
- Private over-threshold aggregation protocols
Cites Work
Cited In (8)
- Private data aggregation over selected subsets of users
- Perfectly secure data aggregation via shifted projections
- Private over-threshold aggregation protocols
- On Insecure Uses of BGN for Privacy Preserving Data Aggregation Protocols
- Privacy-Preserving Stream Aggregation with Fault Tolerance
- Local differential privacy protocol for making key-value data robust against poisoning attacks
- Privacy assurances in multiple data-aggregation transactions
- Practical fault-tolerant data aggregation
Uses Software
This page was built for publication: Privacy-preserving data aggregation with probabilistic range validation
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2117046)