From 52291643ded9185242cce3087731e67ecd84eef4 Mon Sep 17 00:00:00 2001 From: Bill Buchanan Date: Fri, 25 Mar 2022 08:35:34 +0000 Subject: [PATCH] Update README.md --- z_assessments/coursework/README.md | 1 + 1 file changed, 1 insertion(+) diff --git a/z_assessments/coursework/README.md b/z_assessments/coursework/README.md index aa4322f..07ce5f0 100644 --- a/z_assessments/coursework/README.md +++ b/z_assessments/coursework/README.md @@ -16,6 +16,7 @@ You are requested to investigate, build a prototype, and evaluate one of the fol * **Tokenization**. There is a vast increase in the usage of tokens to either protect sensitive details or provide one-time access. This area will allow you to investigate different tokenization methods, such as using Ferrnet tokens or some of the security weaknesses of OAuth 2. * **IPFS (Interplanetary File System)**. This breaks files into chunks and then distributes them around the world and where we can integrate version control on files. Overall it has advances in reducing latency, improving resilance, and avoiding censorship. * **Passwordless systems**. This supports MFA using biometrics, NFC, and BLE, and supports FIDO2 using public key encryption. +* **Privacy Preserving Machine Learning**. With this we can use cyptography methods to preserve the privacy of our data for machine learning applications. There are many different methods involved in each of these areas, so while your literature review might have a relatively wide scope, you might want to focus in on one or more methods for your implementation and evaluation. You may also pick another related area, but this would have to be approved by your tutor.