Language:
English
繁體中文
Help
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Privacy enhancing techniques = practices and applications /
Record Type:
Language materials, printed : Monograph/item
Title/Author:
Privacy enhancing techniques/ by Xun Yi ... [et al.].
Reminder of title:
practices and applications /
other author:
Yi, Xun.
Published:
Cham :Springer Nature Switzerland : : 2025.,
Description:
xi, 254 p. :ill. (some col.), digital ; : 24 cm.;
Contained By:
Springer Nature eBook
Subject:
Privacy-preserving techniques (Computer science) -
Online resource:
https://doi.org/10.1007/978-3-031-95140-4
ISBN:
9783031951404
Privacy enhancing techniques = practices and applications /
Privacy enhancing techniques
practices and applications /[electronic resource] :by Xun Yi ... [et al.]. - Cham :Springer Nature Switzerland :2025. - xi, 254 p. :ill. (some col.), digital ;24 cm.
Chapter 1: Introduction -- Chapter 2: Homomorphic Encryption -- Chapter 3: Multiparty Computation -- Chapter 4: Differential Privacy -- Chapter 5: Privacy-Preserving Data Mining -- Chapter 6: Privacy-Preserving Machine Learning -- Chapter 7: Privacy-Preserving Social Networks -- Chapter 8: Privacy-Preserving Location-Based Services -- Chapter 9: Privacy and Digital Trust -- Chapter 10: Conclusion.
This book provides a comprehensive exploration of advanced privacy-preserving methods, ensuring secure data processing across various domains. This book also delves into key technologies such as homomorphic encryption, secure multiparty computation, and differential privacy, discussing their theoretical foundations, implementation challenges, and real-world applications in cloud computing, blockchain, artificial intelligence, and healthcare. With the rapid growth of digital technologies, data privacy has become a critical concern for individuals, businesses, and governments. The chapters cover fundamental cryptographic principles and extend into applications in privacy-preserving data mining, secure machine learning, and privacy-aware social networks. By combining state-of-the-art techniques with practical case studies, this book serves as a valuable resource for those navigating the evolving landscape of data privacy and security. Designed to bridge theory and practice, this book is tailored for researchers and graduate students focused on this field. Industry professionals seeking an in-depth understanding of privacy-enhancing technologies will also want to purchase this book.
ISBN: 9783031951404
Standard No.: 10.1007/978-3-031-95140-4doiSubjects--Topical Terms:
1454935
Privacy-preserving techniques (Computer science)
LC Class. No.: QA76.9.P735 / Y5 2025
Dewey Class. No.: 005.8
Privacy enhancing techniques = practices and applications /
LDR
:02612nam a2200325 a 4500
001
1167007
003
DE-He213
005
20250716130245.0
006
m d
007
cr nn 008maaau
008
251217s2025 sz s 0 eng d
020
$a
9783031951404
$q
(electronic bk.)
020
$a
9783031951398
$q
(paper)
024
7
$a
10.1007/978-3-031-95140-4
$2
doi
035
$a
978-3-031-95140-4
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.P735
$b
Y5 2025
072
7
$a
URD
$2
bicssc
072
7
$a
COM060040
$2
bisacsh
072
7
$a
URD
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.P735
$b
P961 2025
245
0 0
$a
Privacy enhancing techniques
$h
[electronic resource] :
$b
practices and applications /
$c
by Xun Yi ... [et al.].
260
$a
Cham :
$c
2025.
$b
Springer Nature Switzerland :
$b
Imprint: Springer,
300
$a
xi, 254 p. :
$b
ill. (some col.), digital ;
$c
24 cm.
505
0
$a
Chapter 1: Introduction -- Chapter 2: Homomorphic Encryption -- Chapter 3: Multiparty Computation -- Chapter 4: Differential Privacy -- Chapter 5: Privacy-Preserving Data Mining -- Chapter 6: Privacy-Preserving Machine Learning -- Chapter 7: Privacy-Preserving Social Networks -- Chapter 8: Privacy-Preserving Location-Based Services -- Chapter 9: Privacy and Digital Trust -- Chapter 10: Conclusion.
520
$a
This book provides a comprehensive exploration of advanced privacy-preserving methods, ensuring secure data processing across various domains. This book also delves into key technologies such as homomorphic encryption, secure multiparty computation, and differential privacy, discussing their theoretical foundations, implementation challenges, and real-world applications in cloud computing, blockchain, artificial intelligence, and healthcare. With the rapid growth of digital technologies, data privacy has become a critical concern for individuals, businesses, and governments. The chapters cover fundamental cryptographic principles and extend into applications in privacy-preserving data mining, secure machine learning, and privacy-aware social networks. By combining state-of-the-art techniques with practical case studies, this book serves as a valuable resource for those navigating the evolving landscape of data privacy and security. Designed to bridge theory and practice, this book is tailored for researchers and graduate students focused on this field. Industry professionals seeking an in-depth understanding of privacy-enhancing technologies will also want to purchase this book.
650
0
$a
Privacy-preserving techniques (Computer science)
$3
1454935
650
1 4
$a
Privacy.
$3
575491
650
2 4
$a
Data Mining and Knowledge Discovery.
$3
677765
650
2 4
$a
Machine Learning.
$3
1137723
700
1
$a
Yi, Xun.
$e
editor.
$3
1362598
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
856
4 0
$u
https://doi.org/10.1007/978-3-031-95140-4
950
$a
Professional and Applied Computing (SpringerNature-12059)
based on 0 review(s)
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login