000 -LEADER |
fixed length control field |
nam a22 4500 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
240405b xxu||||| |||| 00| 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781009299510 |
Terms of availability |
hbk. |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.8 |
Item number |
CHE |
100 ## - MAIN ENTRY--PERSONAL NAME |
Personal name |
Chen, Kai |
245 ## - TITLE STATEMENT |
Title |
Privacy-preserving computing for big data analytics and AI |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Name of publisher, distributor, etc |
Cambridge University Press, |
Date of publication, distribution, etc |
2022 |
Place of publication, distribution, etc |
Cambridge : |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xii, 255 p. ; |
Other physical details |
ill., |
Dimensions |
24 cm. |
365 ## - TRADE PRICE |
Price amount |
49.99 |
Price type code |
₤ |
Unit of pricing |
109.40 |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc |
Includes bibliographical references and index. |
520 ## - SUMMARY, ETC. |
Summary, etc |
Privacy-preserving computing aims to protect the personal information of users while capitalizing on the possibilities unlocked by big data. This practical introduction for students, researchers, and industry practitioners is the first cohesive and systematic presentation of the field's advances over four decades. The book shows how to use privacy-preserving computing in real-world problems in data analytics and AI, and includes applications in statistics, database queries, and machine learning. The book begins by introducing cryptographic techniques such as secret sharing, homomorphic encryption, and oblivious transfer, and then broadens its focus to more widely applicable techniques such as differential privacy, trusted execution environment, and federated learning. The book ends with privacy-preserving computing in practice in areas like finance, online advertising, and healthcare, and finally offers a vision for the future of the field. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Big data |
|
Topical term or geographic name as entry element |
USENIX |
|
Topical term or geographic name as entry element |
Privacy-preserving computing |
|
Topical term or geographic name as entry element |
Secure multiparty computation |
|
Topical term or geographic name as entry element |
Trusted Execution Environment |
|
Topical term or geographic name as entry element |
Oblivious Transfer |
|
Topical term or geographic name as entry element |
Bloom filter |
|
Topical term or geographic name as entry element |
Ciphertext |
|
Topical term or geographic name as entry element |
Data privacy |
|
Topical term or geographic name as entry element |
Differential privacy |
|
Topical term or geographic name as entry element |
Homomorphic encryption |
|
Topical term or geographic name as entry element |
Computer security |
|
Topical term or geographic name as entry element |
Big data |
|
Topical term or geographic name as entry element |
Information technology |
|
Topical term or geographic name as entry element |
Security measures privacy |
|
Topical term or geographic name as entry element |
Right of IT security |
|
Topical term or geographic name as entry element |
Security |
|
Topical term or geographic name as entry element |
Intel SGX |
|
Topical term or geographic name as entry element |
Machine learning |
700 ## - ADDED ENTRY--PERSONAL NAME |
Personal name |
Yang, Qiang |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
|
Item type |
Books |