Data Privacy Games 2018
DOI: 10.1007/978-3-319-77965-2_2
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-Preserving Data Collecting: A Simple Game Theoretic Approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 9 publications
0
2
0
Order By: Relevance
“…The privacy requirements should be specified for collecting, storing and processing the big data. [22] There are different ways to secure the data and more ways are being introduced. One of them is cryptography and it is the frequently used method.…”
Section: Data Privacymentioning
confidence: 99%
“…The privacy requirements should be specified for collecting, storing and processing the big data. [22] There are different ways to secure the data and more ways are being introduced. One of them is cryptography and it is the frequently used method.…”
Section: Data Privacymentioning
confidence: 99%
“…To overcome the problem of computation accuracy reduction, an approximation method is proposed in [21] which leads to obtain a closed form of aggregators decision problem. In [34], a slightly different scenario is considered in which a data aggregator collects data from consumers and then spreads data to supplier. The goal is to preserve consumers data privacy.…”
Section: Related Workmentioning
confidence: 99%