Results 31 to 40 of about 652,105 (293)
Blockchain of Resource-Efficient Anonymity Protection with Watermarking for IoT Big Data Market
According to the ever-growing supply and demand of IoT content, IoT big data in diversified applications are deemed a valuable asset by private and public sectors. Their privacy protection has been a hot research topic.
Chia-Hui Wang, Chih-Hao Hsu
doaj +1 more source
Anonymous Networking amidst Eavesdroppers [PDF]
The problem of security against timing based traffic analysis in wireless networks is considered in this work. An analytical measure of anonymity in eavesdropped networks is proposed using the information theoretic concept of equivocation. For a physical
He, Ting +2 more
core +4 more sources
Bioscience students were asked for their opinions on the value and teaching of skills. 204 responded that teamwork, time management and study skills are necessary to reach University, that scientific writing, research, laboratory and presentation skills are taught effectively during their studies, while other skills are gained inherently through study ...
Janella Borrell, Susan Crennell
wiley +1 more source
Internet addiction may arise from multiple factors and personality tendencies have been previously implicated. Prior studies have found that extraversion may be a protective factor mitigating against internet addiction, yielding a “rich-get-richer ...
Shaozhen Zhang +3 more
doaj +1 more source
Conscript Your Friends into Larger Anonymity Sets with JavaScript
We present the design and prototype implementation of ConScript, a framework for using JavaScript to allow casual Web users to participate in an anonymous communication system.
Corrigan-Gibbs, Henry, Ford, Bryan
core +1 more source
Real‐World Investigation of Satralizumab in Patients With Neuromyelitis Optica Spectrum Disease
ABSTRACT Objective Satralizumab, a monoclonal antibody targeting the interleukin‐6 receptor, has demonstrated efficacy in clinical trials for neuromyelitis optica spectrum disorder (NMOSD). However, its real‐world effectiveness and safety compared to conventional immunosuppressive therapies remain uncertain.
Li‐Tsung Lin +2 more
wiley +1 more source
Background Protecting individual anonymity is a common practice in harm reduction (HR), as it can mitigate the fears that may prevent people from accessing services. Protecting anonymity usually means applying for services with a pseudonym.
Johanna Ranta +4 more
doaj +1 more source
Anonymization-based privacy protection ensures that data cannot be traced back to individuals. Researchers working in this area have proposed a wide variety of anonymization algorithms, many of which require a considerable number of database accesses. This is a problem of efficiency, especially when the released data is subject to visualization or when
Nergiz, Mehmet +2 more
openaire +3 more sources
Neuropsychiatric Symptoms Mimicking Dementia in a Patient Treated With Imatinib
ABSTRACT Tyrosine kinase inhibitors are the cornerstone of chronic myeloid leukemia treatment. Newer agents have more potency and a broader spectrum of action, but also a higher potential for neuropsychiatric side effects. We present a case of a patient on imatinib who developed progressive cognitive, mood, and behavioral alterations.
Ashley Jones +3 more
wiley +1 more source
Conditions for anonymity in some generic public-key encryption constructions
In applications of public-key encryption schemes, anonymity(key-privacy) as well as security(data-privacy) is useful and widely desired.Recently Canetti-Halevi-Katz proposed a generic and elegant IBE-based construction for(tra-ditional) public-key ...
TIAN Yuan, DENG Lu-yao, ZHANG Hao
doaj +2 more sources

