🏠 Home
Benchmark
📊 Tutti i benchmark 🦖 Dinosauro v1 🦖 Dinosauro v2 ✅ App To-Do List 🎨 Pagine libere creative 🎯 FSACB - Ultimate Showcase 🌍 Benchmark traduzione
Modelli
🏆 Top 10 modelli 🆓 Modelli gratuiti 📋 Tutti i modelli ⚙️ Kilo Code
Risorse
💬 Libreria di prompt 📖 Glossario IA 🔗 Link utili

Glossario IA

Il dizionario completo dell'Intelligenza Artificiale

162
categorie
2.032
sottocategorie
23.060
termini
📖
termini

Private Set Intersection

Cryptographic protocol allowing two parties to discover the intersection of their private data sets without revealing other information. This method is particularly useful for collaboration between organizations while preserving confidentiality.

📖
termini

Secure Enclaves

Hardware-level isolated and secure memory area that ensures the confidentiality and integrity of the code and data executed there. Secure enclaves protect against unauthorized access even by the operating system or hypervisor.

📖
termini

k-Anonymity

Privacy protection model ensuring that each record in an anonymized dataset is indistinguishable from at least k-1 other records. This approach prevents re-identification through cross-referencing of quasi-identifiers.

📖
termini

l-Diversity

Extension of the k-anonymity model ensuring that for each group of quasi-identical records, there are at least l distinct values for sensitive attributes. This measure strengthens protection against attribute inference attacks.

📖
termini

t-Closeness

Privacy criterion requiring that the distribution of sensitive values in each equivalence group be close to the overall distribution in the dataset. This approach prevents distribution inference attacks in anonymized data.

📖
termini

Secure Function Evaluation

Protocol allowing multiple parties to collaborate to evaluate a function on their combined private inputs without revealing these inputs individually. This technology enables collaborative analysis while preserving the confidentiality of participants' data.

📖
termini

Distributed Ledger Privacy

Set of cryptographic techniques applied to distributed ledgers to ensure transaction confidentiality while maintaining transparency and auditability. These mechanisms include blind signatures, commitments, and zero-knowledge proofs.

🔍

Nessun risultato trovato