Trust and security

Differential Privacy or how to anonymize datas while managing its usage?

Is it possible to identify one person whose data are scrambled among numerous data? Is it possible […]

Understanding of algorithms

Recommendations, filters, rankings, rating systems, and social network news feeds are all examples of the omnipresence of […]

Fully homomorphic encryption, or how to perform operations over encrypted data

Can we outsource medical analysis without giving away our medical information? Can we do biometrical identification without […]

MesInfos: reconciling data protection and innovation

The New Generation Internet Foundation (FING) recently invited all stakeholders involved in personal data to join forces […]

collaborative economy collaborative consumption Trust Internet of Things Cyber-Physical Systems Sensor & Actuator Networks Reactive Systems M2M fog computing IoT