Improving Bitswap Privacy with Forwarding and Source Obfuscation.
Erik DanielMarcel EbertFlorian TschorschPublished in: LCN (2023)
Keyphrases
- personal information
- privacy issues
- differential privacy
- database
- data transformation
- third party
- sensitive information
- private information
- privacy requirements
- privacy aware
- malware detection
- private data
- control flow
- privacy preservation
- data privacy
- privacy protection
- statistical databases
- reverse engineering
- privacy preserving
- sensor networks
- wireless sensor networks
- information systems
- neural network