Blog

Leveraging Large Language Models (LLMs) for Mapping Tabular Data to Ontologies

Automate Data Integration with Large Language Models (LLMs): Discover how LLMs can streamline the mapping of tabular data to ontologies, transforming raw data into structured insights and driving efficiency in data management.

by Mary Papoutsoglou, Aristotle University of Thessaloniki.

Homomorphic Encryption Applied to Various Use Cases

Discover how homomorphic encryption is used for data security by enabling computations on encrypted data, safeguarding privacy even during processing. From determining loan eligibility in FinTech to detecting cyber threats and confidential medical analysis, this cutting-edge technology is transforming how we handle sensitive information.

by Jean-Paul Bultel, CEA.

Differential Privacy within ENCRYPT: Ensuring Privacy While Maximizing Data Utility

Explore how Differential Privacy empowers ENCRYPT to safeguard data privacy while optimizing data utility, offering users a simple yet effective means to protect their data without sacrificing analytical insights.

by Stelios Erotokritou, Eight Bells Ltd.

Enhancing CTI Extraction Using Privacy-Preserving Techniques

Explore how Fully Homomorphic Encryption and Trusted Execution Environments revolutionize Cyber Threat Intelligence extraction by enabling secure and private analysis of sensitive data to combat evolving cyber threats.

by Angelos Papoutsis, Research Associate, Centre for Research and Technology Hellas

Combining Trusted Execution Environment and Homomorphic Encryption

Unlocking New Frontiers in Privacy: ENCRYPT's Fusion of Homomorphic Encryption and Trusted Environments

by Giovanni Mazzeo, Co-founder of Trust Up srl and Assistant Professor at University of Naples ‘Parthenope’.

Understanding Fuzzy Logic in the ENCRYPT Project

Learn how the ENCRYPT project leverages fuzzy logic to enhance data privacy through AI-driven, personalized technology recommendations

by EXUS

Hardware Acceleration for FHE

Boosting Privacy: Unleashing the Power of Hardware Acceleration in ENCRYPT for Efficient Fully Homomorphic Encryption (FHE) Data Processing

by Orion Papadakis, Thanos Stratikopoulos, Michalis Papadimitriou, Mary Xekalaki, Juan Fumero, Christos Kotselidis, University of Manchester

Hardware Acceleration for FHE

Boosting Privacy: Unleashing the Power of Hardware Acceleration in ENCRYPT for Efficient Fully Homomorphic Encryption (FHE) Data Processing

by Orion Papadakis, Thanos Stratikopoulos, Michalis Papadimitriou, Mary Xekalaki, Juan Fumero, Christos Kotselidis, University of Manchester

Enhancing Patient Privacy in Medicine: Leveraging Differential Privacy for Secure Data Sharing

Safeguarding Patient Confidentiality in Collaborative Healthcare: A Closer Look at How Differential Privacy Elevates Medical Data Sharing Security

by Ioannis Xanthoulis, DBC

Knowledge Graphs

Navigating the Web of Knowledge: Unraveling the Power of Semantic Web, Ontologies, and Knowledge Graphs in the ENCRYPT Project

by Dr. Mary Papoutsoglou, Professor Georgios Meditskos and Christina Karalka, Aristotle University of Thessaloniki

Software Guard eXtension

Software Guard eXtension and it’s applications in the medical domain

by Salvatore D’Antonio, Associate Professor at University of Naples, Parthenope

Homomorphic Encryption

Safeguarding Data Privacy in Distributed Learning: Mitigating Risks and Harnessing Homomorphic Encryption

by Martin Zuber, Cryptography Researcher, CEA

DP in Fintech use case

Deployment of Local Differential Privacy in the ENCRYPT Fintech Use Case

by Konstantina Papachristopoulou, Senior R&D Project Manager, Eight Bells Ltd.

Data Preprocessing: A Vital Step in Privacy-Preserving Technologies

by Angelos Papoutsis, Data Science/Cybersecurity Researcher, Centre for Research & Technology Hellas

Privacy Risk Assessment

Existing methodologies to analyse security risks connected to personal data processing, an overview

By Paolo Roccetti, Head of Cybersecurity research unit, Engineering Ingegneria Informatica

Cyber Resilience Act

A Proposal for a Cyber Resilience Act: the missing puzzle for a comprehensive EU cybersecurity framework?

Dr. Irene Kamara, Assistant professor at Tilburg Institute for Law, Technology, and Society (TILT)

Data Privacy

Preserving data privacy without a PhD in cybersecurity

by Sotiris Diamantopoulos, Research and Innovation manager, EXUS

Differential Privacy

How does Differential Privacy ensure protection of personal data

by Konstantinos Kaltakis, Eight Bells Ltd.

Subscribe to our newsletter

Please send us an email to: info.encryptproject@gmail.com

Email subject: Subscribe

*By subscribing to our newsletters, you accept the privacy and cookies policy