How to Protect Data Privacy in Collaborative Network Security

被引:0
|
作者
Burkhart, Martin [1 ]
Dimitropoulos, Xenofontas [1 ]
机构
[1] Swiss Fed Inst Technol, Zurich, Switzerland
来源
ERCIM NEWS | 2012年 / 90期
关键词
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
At ETH Zurich, we have developed the SEPIA library, which makes secure multiparty computation practical for many participants and large input data volumes. This paves the way for novel approaches in collaborative network security.
引用
收藏
页码:38 / 39
页数:2
相关论文
共 50 条
  • [1] How to protect privacy in open data
    Wicherts, Jelte M.
    Klein, Richard A.
    Swaans, Sofie H. F.
    Maassen, Esther
    Stoevenbelt, Andrea H.
    Peeters, Victor H. B. T. G.
    De Jonge, Myrthe
    Ruffer, Franziska
    [J]. NATURE HUMAN BEHAVIOUR, 2022, 6 (12) : 1603 - 1605
  • [2] How to protect privacy in open data
    Jelte M. Wicherts
    Richard A. Klein
    Sofie H. F. Swaans
    Esther Maassen
    Andrea H. Stoevenbelt
    Victor H. B. T. G. Peeters
    Myrthe de Jonge
    Franziska Rüffer
    [J]. Nature Human Behaviour, 2022, 6 : 1603 - 1605
  • [3] Personal data anonymization for security and privacy in collaborative environments
    El Kalam, AA
    Deswarte, Y
    Trouessin, G
    Cordonnier, E
    [J]. 2005 INTERNATIONAL SYMPOSIUM ON COLLABORATIVE TECHNOLOGIES AND SYSTEMS, PROCEEDINGS, 2005, : 56 - 61
  • [4] How to Protect Privacy in Floating Car Data Systems
    Rass, Stefan
    Fuchs, Simone
    Schaffer, Martin
    Kyamakya, Kyandoghere
    [J]. VANET'08: PROCEEDINGS OF THE FIFTH ACM INTERNATIONAL WORKSHOP ON VEHICULAR INTER-NETWORKING, 2008, : 17 - 22
  • [5] European trends in privacy - How can we increase internet security and protect individual privacy?
    Ostergaard, BSD
    [J]. INTERNATIONAL CONFERENCE ON POLITICS AND INFORMATION SYSTEMS: TECHNOLOGIES AND APPLICATIONS, PROCEEDINGS, 2003, : 143 - 147
  • [6] Two-Factor Decryption: A Better Way to Protect Data Security and Privacy
    Cui, Hui
    Paulet, Russell
    Nepal, Surya
    Yi, Xun
    Mbimbi, Butrus
    [J]. COMPUTER JOURNAL, 2021, 64 (04): : 550 - 563
  • [7] Cloud security: how to protect critical data and stay productive
    Bunting, Charlene
    [J]. Network Security, 2019, 2019 (09) : 18 - 19
  • [8] Protect privacy of mobile data
    Caroline O. Buckee
    [J]. Nature, 2014, 514 : 35 - 35
  • [9] Protect privacy of mobile data
    Buckee, Caroline O.
    [J]. NATURE, 2014, 514 (7520) : 35 - 35
  • [10] Security and privacy in collaborative distributed systems
    Yau, SS
    Bonatti, PA
    [J]. Proceedings of the 29th Annual International Computer Software and Applications Conference, 2005, : 267 - 267