Applied homomorphic encryption Homomorphic encryption is a recent cryptographic technique that allows us to perform computation directly on encrypted data. This allows …

In a previous post (read here), we introduced the concept of Differential Privacy and its significance in safeguarding individual privacy among the …

The need for effective Cyber Threat Intelligence (CTI) has never been greater, with cyber-threats evolving at an unprecedented rate, targeting individuals and …

by Giovanni Mazzeo, Co-founder of Trust Up srl and Assistant Professor at University of Naples ‘Parthenope’. The field of privacy-preserving computing techniques …

What is Fuzzy Logic? Imagine you’re trying to describe how hungry you are. It’s not just ‘hungry’ or ‘not hungry’; there’s a …

Hardware Acceleration for FHE by Orion Papadakis, Thanos Stratikopoulos, Michalis Papadimitriou, Mary Xekalaki, Juan Fumero, Christos Kotselidis University of Manchester Introduction: The …

Enhancing Patient Privacy in Medicine: Leveraging Differential Privacy for Secure Data Sharing, by Ioannis Xanthoulis, DBC   Introduction: In the rapidly advancing …

Knowledge Graphs, by Mary Papoutsoglou Ph.D.*, Georgios Meditskos Professor * and Christina Karalka Msc* *Aristotle University of Thessaloniki   The Semantic Web …

Software Guard eXtension and it’s applications in the medical domain by  Salvatore D’Antonio, Associate Professor at University of Naples, Parthenope Intel Software …

Safeguarding Data Privacy in Distributed Learning: Mitigating Risks and Harnessing Homomorphic Encryption by Martin Zuber, Cryptography Researcher, CEA Distributed Learning: In the …

Deployment of Local Differential Privacy in the ENCRYPT Fintech Use Case by Konstantina Papachristopoulou, Senior R&D Project Manager, Eight Bells Ltd. In …

Data Preprocessing: A Vital Step in Privacy-Preserving Technologies by Angelos Papoutsis, Data Science/Cybersecurity Researcher, Centre for Research & Technology Hellas In today’s …

Existing methodologies to analyse security risks connected to personal data processing, an overview By Paolo Roccetti, Head of Cybersecurity research unit, Engineering …

A Proposal for a Cyber Resilience Act: the missing puzzle for a comprehensive EU cybersecurity framework? Dr. Irene Kamara, Assistant professor at …

Preserving data privacy without a PhD in cybersecurity by Sotiris Diamantopoulos, Research and Innovation manager, EXUS The need for privacy preserving processing …

How does Differential Privacy ensure protection of personal data by Konstantinos Kaltakis, Eight Bells Ltd. The “right to privacy” is a human …