usdot-its-jpo-data-portal / privacy-protection-applicationLinks
Privacy Protection Application (PPA): Code and instructions for building two tools for processing vehicle trip, or trajectory, data to protect driver privacy by hiding potentially sensitive locations. These tools were developed to process large databases of trips generated during connected vehicle pilot studies, but they could be used on any typ…
☆13Updated 7 years ago
Alternatives and similar repositories for privacy-protection-application
Users that are interested in privacy-protection-application are comparing it to the libraries listed below
Sorting:
- The Scyther Tool for the symbolic analysis of security protocols☆105Updated 3 months ago
- A decentralized privacy-preserving data sharing tool☆31Updated 4 years ago
- Trusted Computing based services supporting TPM provisioning and supply chain validation concepts. #nsacyber☆203Updated this week
- OASIS TC Open Repository: STIX Enhancement Proposals (SEPs) https://github.com/oasis-open/cti-sep-repository☆16Updated 2 years ago
- APRICOT: Advanced Protocols for Real-world Implementation of Computational Oblivious Transfers☆16Updated 9 years ago
- A python library that implements a number of Privacy Enhancing Technolgies☆135Updated 3 years ago
- Security and Privacy Assurance Research Test and Assessment (SPARTA) tool suite☆37Updated 8 years ago
- privacy-preserving attribute-based credentials engine☆80Updated 9 years ago
- PoC of an SGX enclave performing symmetric reencryption☆50Updated 9 years ago
- A server-side Website Fingerprinting defence called "Application Layer Padding Concerns Adversaries"☆11Updated 6 years ago
- XPIR: Private Information Retrieval for Everyone☆119Updated 4 years ago
- Cryptanalysis code for the SIMON and SPECK families of block ciphers☆20Updated 9 years ago
- Collection of data sources that can be used to provide context to security events☆26Updated 10 years ago
- Implementation of the CL signature scheme☆24Updated 9 years ago
- A Tool for Complex and Scalable Data Access Policy Enforcement☆97Updated 4 years ago
- The Tor Path Simulator☆87Updated 8 years ago
- Intel(R) Software Guard Extensions Protected Code Loader for Linux* OS☆27Updated 3 years ago
- UCLANesl - NIST Differential Privacy Challenge (Match 3)☆25Updated 6 years ago
- SGX command-line tools and paper☆147Updated 9 years ago
- Documents pertaining to internal policies and guidelines☆12Updated 8 years ago
- Proof-of-concept implementation of a homomorphic Simon encryption using YASHE and FV leveled homomorphic cryptosystems☆20Updated 10 years ago
- The OpenDXL Ontology project is focused on the development of an open and interoperable cybersecurity messaging format for use with the O…☆76Updated 4 years ago
- A repository for development of the TAXII Specifications. For official releases, please see http://taxiiproject.github.io/releases/☆41Updated 10 years ago
- Cerebro: A platform for Secure Coopetitive Learning☆23Updated 4 years ago
- Practical Cryptoanalysis☆12Updated 10 years ago
- The SIMON and SPECK families of lightweight block ciphers. #nsacyber☆166Updated 6 years ago
- Efficient TLS termination inside Intel SGX enclaves for existing applications☆109Updated 3 years ago
- OASIS OpenC2 TC: Repository for submitting and reviewing OpenC2 use cases relevant to the work of the OpenC2 Language Subcommittee (LSC)☆30Updated 3 years ago
- Industry Working Group on Automated Cryptographic Algorithm Validation☆189Updated 2 weeks ago
- Automatically exported from code.google.com/p/des-linear-and-differential-cryptoanalysis☆10Updated 10 years ago