Privacy Enhancing Techniques - Andrei Kelarev
- Format: Broché Voir le descriptif
Vous en avez un à vendre ?
Vendez-le-vôtre64,37 €
Produit Neuf
Ou 16,09 € /mois
- Livraison à 0,01 €
- Livré entre le 4 et le 11 mai
Brand new, In English, Fast shipping from London, UK; Tout neuf, en anglais, expédition rapide depuis Londres, Royaume-Uni;ria9783031951398_dbm
- Payez directement sur Rakuten (CB, PayPal, 4xCB...)
- Récupérez le produit directement chez le vendeur
- Rakuten vous rembourse en cas de problème
Gratuit et sans engagement
Félicitations !
Nous sommes heureux de vous compter parmi nos membres du Club Rakuten !
TROUVER UN MAGASIN
Retour
Avis sur Privacy Enhancing Techniques de Andrei Kelarev Format Broché - Livre Informatique
0 avis sur Privacy Enhancing Techniques de Andrei Kelarev Format Broché - Livre Informatique
Les avis publiés font l'objet d'un contrôle automatisé de Rakuten.
-
Art Of Modern Rock
2 avis
Occasion dès 50,00 €
-
Mobilier Art Deco
Occasion dès 47,00 €
-
Arda Reconstructed
Neuf dès 67,42 €
-
La Sante Interdite
Occasion dès 71,00 €
-
Bernard Frize: Longues Lignes (Souvent Fermees)
Occasion dès 55,99 €
-
My Favorite Thing Is Monsters
1 avis
Neuf dès 50,53 €
-
Bmw R1200 Twins (04 - 09) Haynes Repair Manual
Neuf dès 45,11 €
Occasion dès 80,99 €
-
The Rare Record Price Guide 2026
Neuf dès 44,66 €
-
Sedum: Cultivated Stonecrops
Occasion dès 34,51 €
-
Fleet Tactics And Naval Operations, Third Edition
Neuf dès 39,33 €
-
Lewis Carroll's Photography And Modern Childhood
Neuf dès 83,15 €
-
Shakespeare Comes To Broadmoor
Neuf dès 40,41 €
-
Complete Ielts Bands 6.5-7.5 Workbook Without Answers With Audio Cd
Neuf dès 38,71 €
-
Phenomenology Of Spirit
Neuf dès 48,69 €
Occasion dès 37,32 €
-
Karl Blossfeldt
2 avis
Occasion dès 69,00 €
-
Pomellato
Occasion dès 80,00 €
-
Tour Auto - 25e Édition
1 avis
Neuf dès 59,00 €
Occasion dès 35,40 €
-
Under The Banner Of Concern
Neuf dès 32,31 €
-
Warehouse Management
Neuf dès 66,26 €
-
Storm Chasing Handbook, 2nd. Ed.
Neuf dès 64,46 €
Produits similaires
Présentation Privacy Enhancing Techniques de Andrei Kelarev Format Broché
- Livre Informatique
Résumé : This book provides a comprehensive exploration of advanced privacy-preserving methods, ensuring secure data processing across various domains. This book also delves into key technologies such as homomorphic encryption, secure multiparty computation, and differential privacy, discussing their theoretical foundations, implementation challenges, and real-world applications in cloud computing, blockchain, artificial intelligence, and healthcare. With the rapid growth of digital technologies, data privacy has become a critical concern for individuals, businesses, and governments. The chapters cover fundamental cryptographic principles and extend into applications in privacy-preserving data mining, secure machine learning, and privacy-aware social networks. By combining state-of-the-art techniques with practical case studies, this book serves as a valuable resource for those navigating the evolving landscape of data privacy and security. Designed to bridge theory and practice, this book is tailored for researchers and graduate students focused on this field. Industry professionals seeking an in-depth understanding of privacy-enhancing technologies will also want to purchase this book....
Biographie:
Xun Yi is a Professor with the School of Computing Technologies, RMIT University, Australia. His research interests include data privacy protection, cloud and IoT security, blockchain, network security, and applied cryptography. He has published over 300 research papers in international journals and conference proceedings. He serves as an Associate Editor for IEEE Transactions on Dependable and Secure Computing, IEEE Transactions on Knowledge and Data Engineering, ACM Computing Surveys, and Information Sciences. Xuechao Yang is a Lecturer at the School of Computing Technologies, RMIT University, Australia. He holds a bachelor&rsquo...
Sommaire:
Chapter 1: Introduction.- Chapter 2: Homomorphic Encryption.- Chapter 3: Multiparty Computation.- Chapter 4: Differential Privacy.- Chapter 5: Privacy-Preserving Data Mining.- Chapter 6: Privacy-Preserving Machine Learning.- Chapter 7: Privacy-Preserving Social Networks.- Chapter 8: Privacy-Preserving Location-Based Services.- Chapter 9: Privacy and Digital Trust.- Chapter 10: Conclusion....
Détails de conformité du produit
Personne responsable dans l'UE