Background Record linkage is the process of identifying and connecting records that refer to the same entity, such as a patient, across …
In today’s digital world, financial companies collect and process huge amounts of personal data, including banking habits, spending patterns and even the …
In the dynamic and rapidly evolving world of FinTech, data security and privacy have become critical concerns. Financial institutions manage vast amounts …
In the article “ENCRYPT Blog Series #4: Privacy Risk Assessment”, various methodologies were presented to carry out a privacy-related risk assessment. Specifically, …
In today’s data-driven world, the ability to effectively integrate and analyze diverse data sources is crucial. A common challenge in this context …
Applied homomorphic encryption Homomorphic encryption is a recent cryptographic technique that allows us to perform computation directly on encrypted data. This allows …
In a previous post (read here), we introduced the concept of Differential Privacy and its significance in safeguarding individual privacy among the …
The need for effective Cyber Threat Intelligence (CTI) has never been greater, with cyber-threats evolving at an unprecedented rate, targeting individuals and …
by Giovanni Mazzeo, Co-founder of Trust Up srl and Assistant Professor at University of Naples ‘Parthenope’. The field of privacy-preserving computing techniques …
What is Fuzzy Logic? Imagine you’re trying to describe how hungry you are. It’s not just ‘hungry’ or ‘not hungry’; there’s a …
Hardware Acceleration for FHE by Orion Papadakis, Thanos Stratikopoulos, Michalis Papadimitriou, Mary Xekalaki, Juan Fumero, Christos Kotselidis University of Manchester Introduction: The …
Enhancing Patient Privacy in Medicine: Leveraging Differential Privacy for Secure Data Sharing, by Ioannis Xanthoulis, DBC Introduction: In the rapidly advancing …
Knowledge Graphs, by Mary Papoutsoglou Ph.D.*, Georgios Meditskos Professor * and Christina Karalka Msc* *Aristotle University of Thessaloniki The Semantic Web …
Software Guard eXtension and it’s applications in the medical domain by Salvatore D’Antonio, Associate Professor at University of Naples, Parthenope Intel Software …
Safeguarding Data Privacy in Distributed Learning: Mitigating Risks and Harnessing Homomorphic Encryption by Martin Zuber, Cryptography Researcher, CEA Distributed Learning: In the …
Deployment of Local Differential Privacy in the ENCRYPT Fintech Use Case by Konstantina Papachristopoulou, Senior R&D Project Manager, Eight Bells Ltd. In …
Data Preprocessing: A Vital Step in Privacy-Preserving Technologies by Angelos Papoutsis, Data Science/Cybersecurity Researcher, Centre for Research & Technology Hellas In today’s …
Existing methodologies to analyse security risks connected to personal data processing, an overview By Paolo Roccetti, Head of Cybersecurity research unit, Engineering …
A Proposal for a Cyber Resilience Act: the missing puzzle for a comprehensive EU cybersecurity framework? Dr. Irene Kamara, Assistant professor at …
Preserving data privacy without a PhD in cybersecurity by Sotiris Diamantopoulos, Research and Innovation manager, EXUS The need for privacy preserving processing …
How does Differential Privacy ensure protection of personal data by Konstantinos Kaltakis, Eight Bells Ltd. The “right to privacy” is a human …
