Results 51 to 60 of about 652,105 (293)

Hang With Your Buddies to Resist Intersection Attacks [PDF]

open access: yes, 2013
Some anonymity schemes might in principle protect users from pervasive network surveillance - but only if all messages are independent and unlinkable. Users in practice often need pseudonymity - sending messages intentionally linkable to each other but ...
Ford, Bryan   +2 more
core   +3 more sources

Anonymous Reviews:

open access: yesData Science Journal, 2012
In this article, the authors suggest that one method for increasing awareness of the benefits of data sharing can be affected by administering a survey, hopefully encouraging either a minority or majority influence on other members of the behavioural science community. The authors describe the process for creating such a survey and provide their survey,
openaire   +3 more sources

Dual‐Layer Living Hydrogel Enables On‐Demand Delivery of Phages and Probiotics for Synergistic Wound Infection Therapy

open access: yesAdvanced Functional Materials, EarlyView.
A dual‐layer living hydrogel, ProΦGel, integrates bacteriophages and probiotics for synergistic wound infection therapy. The outer gelatin‐based matrix releases phages on demand in response to P. aeruginosa infections, while inner alginate beads sustain probiotic delivery.
Siyuan Tao   +6 more
wiley   +1 more source

Anonymity, Piracy and Counterfeiting in the Polish Language Publications in the Grand Duchy of Lithuania in the 2nd Half of the 16th Century

open access: yesKnygotyra, 2023
On the grounds of the bibliographic analysis of the publications in the Polish language in the Grand Duchy of Lithuania in the second half of the 16th century, this article reconstructs the phenomena of anonymity, counterfeiting and piracy.
Tomas Petreikis
doaj   +1 more source

Spherical Skin Model: Stratified Co‐Culture of Fibroblasts and Keratinocytes on Spherical Beads Toward Compound Screening

open access: yesAdvanced Healthcare Materials, EarlyView.
Models of the human skin must combine the relevant biological contents and suitable biomaterials with the correct spatial organization. Performing compound screening on such in vitro models also requires fast and reproducible production methods of the models.
Elisa Lenzi   +7 more
wiley   +1 more source

Homomorphic encryption location privacy-preserving scheme based on Markov model

open access: yes网络与信息安全学报, 2017
Homomorphic encryption location privacy-preserving scheme based on Markov mode was proposed to solve the problem of location privacy and query privacy protection in location-based service systems.
Kai ZHOU,Jian-qiong HE   +2 more
doaj   +1 more source

De-Anonymizing Anonymous

open access: yes, 2016
Review of: Gabriella Coleman, Hacker, Hoaxer, Whistleblower, Spy.
openaire   +2 more sources

k-Anonymous Patterns [PDF]

open access: yes, 2005
It is generally believed that data mining results do not violate the anonymity of the individuals recorded in the source database. In fact, data mining models and patterns, in order to ensure a required statistical significance, represent a large number of individuals and thus conceal individual identities: this is the case of the minimum support ...
ATZORI, MAURIZIO   +3 more
openaire   +7 more sources

The Future of Research in Cognitive Robotics: Foundation Models or Developmental Cognitive Models?

open access: yesAdvanced Robotics Research, EarlyView.
Research in cognitive robotics founded on principles of developmental psychology and enactive cognitive science would yield what we seek in autonomous robots: the ability to perceive its environment, learn from experience, anticipate the outcome of events, act to pursue goals, and adapt to changing circumstances without resorting to training with ...
David Vernon
wiley   +1 more source

Fact-Checking 5G Security: Bridging the Gap Between Expectations and Reality

open access: yesIEEE Open Journal of the Communications Society
5G cellular systems are currently being deployed worldwide delivering the promised unprecedented levels of throughput and latency to hundreds of millions of users. At such scale and reach, security is crucial. Consequently, the 5G standard includes a new
Oscar Lasierra   +6 more
doaj   +1 more source

Home - About - Disclaimer - Privacy