Searched for: subject%3A%22Data%255C-Aggregation%22
(1 - 7 of 7)
document
Li, Qiongxiu (author), Gundersen, Jaron Skovsted (author), Lopuhaa-Zwakenberg, Milan (author), Heusdens, R. (author)
Privacy-preserving distributed average consensus has received significant attention recently due to its wide applicability. Based on the achieved performances, existing approaches can be broadly classified into perfect accuracy-prioritized approaches such as secure multiparty computation (SMPC), and worst-case privacy-prioritized approaches...
journal article 2024
document
Palazzo, Marco (author)
Large amounts of data are continuously generated by individuals, apps, or dedicated devices. These data can be aggregated to compute useful statistics from multiple sources using data aggregation protocols. However, oftentimes these data contain private information that must be protected from misuse. Privacy-preserving protocols can help to...
master thesis 2022
document
Joosen, Floor (author)
Privacy and security are important topics in data aggregation, as companies are aggregating large amounts of sensitive data from their users. The aim of this paper is to improve the security and privacy of data aggregation using smart contracts, homomorphic encryption and post-quantum encryption methods on Hyperledger Fabric. After a literature...
bachelor thesis 2022
document
Dekker, Florine W. (author), Erkin, Z. (author)
Privacy-preserving data aggregation protocols have been researched widely, but usually cannot guarantee correctness of the aggregate if users are malicious. These protocols can be extended with zero-knowledge proofs and commitments to work in the malicious model, but this incurs a significant computational cost on the end users, making adoption...
conference paper 2021
document
Dekker, Florine (author)
Privacy-preserving data aggregation protocols have been researched widely, but usually cannot guarantee correctness of the aggregate if users are malicious. These protocols can be extended with zero-knowledge proofs and commitments to work in the malicious model, but this incurs a significant computational cost on the end users, making adoption...
master thesis 2020
document
Nandakumar, Lakshminarayanan (author), Ferrari, Riccardo M.G. (author), Keviczky, T. (author)
Releasing state samples generated by a dynamical system model, for data aggregation purposes, can allow an adversary to perform reverse engineering and estimate sensitive model parameters. Upon identification of the system model, the adversary may even use it for predicting sensitive data in the future. Hence, preserving a confidential dynamical...
journal article 2019
document
Chronopoulos, D. (author)
Wireless Sensor Networks (WSNs) are networks of sensor devices that perform environmental monitoring applications. Data aggregation is a vital building block for WSNs that enables rapid gather the information held by the network nodes. A continuous study of different approaches to retrieving aggregates is being carried out by the researchers of...
master thesis 2016
Searched for: subject%3A%22Data%255C-Aggregation%22
(1 - 7 of 7)