Results 31 to 40 of about 652,105 (293)

Blockchain of Resource-Efficient Anonymity Protection with Watermarking for IoT Big Data Market

open access: yesCryptography, 2022
According to the ever-growing supply and demand of IoT content, IoT big data in diversified applications are deemed a valuable asset by private and public sectors. Their privacy protection has been a hot research topic.
Chia-Hui Wang, Chih-Hao Hsu
doaj   +1 more source

Anonymous Networking amidst Eavesdroppers [PDF]

open access: yes, 2007
The problem of security against timing based traffic analysis in wireless networks is considered in this work. An analytical measure of anonymity in eavesdropped networks is proposed using the information theoretic concept of equivocation. For a physical
He, Ting   +2 more
core   +4 more sources

The skills required for transition to university and study in biological sciences: A student perspective

open access: yesFEBS Open Bio, EarlyView.
Bioscience students were asked for their opinions on the value and teaching of skills. 204 responded that teamwork, time management and study skills are necessary to reach University, that scientific writing, research, laboratory and presentation skills are taught effectively during their studies, while other skills are gained inherently through study ...
Janella Borrell, Susan Crennell
wiley   +1 more source

Rich Get Richer: Extraversion Statistically Predicts Reduced Internet Addiction through Less Online Anonymity Preference and Extraversion Compensation

open access: yesBehavioral Sciences, 2022
Internet addiction may arise from multiple factors and personality tendencies have been previously implicated. Prior studies have found that extraversion may be a protective factor mitigating against internet addiction, yielding a “rich-get-richer ...
Shaozhen Zhang   +3 more
doaj   +1 more source

Conscript Your Friends into Larger Anonymity Sets with JavaScript

open access: yes, 2013
We present the design and prototype implementation of ConScript, a framework for using JavaScript to allow casual Web users to participate in an anonymous communication system.
Corrigan-Gibbs, Henry, Ford, Bryan
core   +1 more source

Real‐World Investigation of Satralizumab in Patients With Neuromyelitis Optica Spectrum Disease

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective Satralizumab, a monoclonal antibody targeting the interleukin‐6 receptor, has demonstrated efficacy in clinical trials for neuromyelitis optica spectrum disorder (NMOSD). However, its real‐world effectiveness and safety compared to conventional immunosuppressive therapies remain uncertain.
Li‐Tsung Lin   +2 more
wiley   +1 more source

Relational anonymity in reducing the harms of illicit drug use: accounts of users of dark web- and street-based services in Finland

open access: yesHarm Reduction Journal
Background Protecting individual anonymity is a common practice in harm reduction (HR), as it can mitigate the fears that may prevent people from accessing services. Protecting anonymity usually means applying for services with a pseudonym.
Johanna Ranta   +4 more
doaj   +1 more source

Instant anonymization

open access: yesACM Transactions on Database Systems, 2011
Anonymization-based privacy protection ensures that data cannot be traced back to individuals. Researchers working in this area have proposed a wide variety of anonymization algorithms, many of which require a considerable number of database accesses. This is a problem of efficiency, especially when the released data is subject to visualization or when
Nergiz, Mehmet   +2 more
openaire   +3 more sources

Neuropsychiatric Symptoms Mimicking Dementia in a Patient Treated With Imatinib

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Tyrosine kinase inhibitors are the cornerstone of chronic myeloid leukemia treatment. Newer agents have more potency and a broader spectrum of action, but also a higher potential for neuropsychiatric side effects. We present a case of a patient on imatinib who developed progressive cognitive, mood, and behavioral alterations.
Ashley Jones   +3 more
wiley   +1 more source

Conditions for anonymity in some generic public-key encryption constructions

open access: yesTongxin xuebao, 2009
In applications of public-key encryption schemes, anonymity(key-privacy) as well as security(data-privacy) is useful and widely desired.Recently Canetti-Halevi-Katz proposed a generic and elegant IBE-based construction for(tra-ditional) public-key ...
TIAN Yuan, DENG Lu-yao, ZHANG Hao
doaj   +2 more sources

Home - About - Disclaimer - Privacy