Results 51 to 60 of about 652,105 (293)
Hang With Your Buddies to Resist Intersection Attacks [PDF]
Some anonymity schemes might in principle protect users from pervasive network surveillance - but only if all messages are independent and unlinkable. Users in practice often need pseudonymity - sending messages intentionally linkable to each other but ...
Ford, Bryan +2 more
core +3 more sources
In this article, the authors suggest that one method for increasing awareness of the benefits of data sharing can be affected by administering a survey, hopefully encouraging either a minority or majority influence on other members of the behavioural science community. The authors describe the process for creating such a survey and provide their survey,
openaire +3 more sources
A dual‐layer living hydrogel, ProΦGel, integrates bacteriophages and probiotics for synergistic wound infection therapy. The outer gelatin‐based matrix releases phages on demand in response to P. aeruginosa infections, while inner alginate beads sustain probiotic delivery.
Siyuan Tao +6 more
wiley +1 more source
On the grounds of the bibliographic analysis of the publications in the Polish language in the Grand Duchy of Lithuania in the second half of the 16th century, this article reconstructs the phenomena of anonymity, counterfeiting and piracy.
Tomas Petreikis
doaj +1 more source
Models of the human skin must combine the relevant biological contents and suitable biomaterials with the correct spatial organization. Performing compound screening on such in vitro models also requires fast and reproducible production methods of the models.
Elisa Lenzi +7 more
wiley +1 more source
Homomorphic encryption location privacy-preserving scheme based on Markov model
Homomorphic encryption location privacy-preserving scheme based on Markov mode was proposed to solve the problem of location privacy and query privacy protection in location-based service systems.
Kai ZHOU,Jian-qiong HE +2 more
doaj +1 more source
It is generally believed that data mining results do not violate the anonymity of the individuals recorded in the source database. In fact, data mining models and patterns, in order to ensure a required statistical significance, represent a large number of individuals and thus conceal individual identities: this is the case of the minimum support ...
ATZORI, MAURIZIO +3 more
openaire +7 more sources
The Future of Research in Cognitive Robotics: Foundation Models or Developmental Cognitive Models?
Research in cognitive robotics founded on principles of developmental psychology and enactive cognitive science would yield what we seek in autonomous robots: the ability to perceive its environment, learn from experience, anticipate the outcome of events, act to pursue goals, and adapt to changing circumstances without resorting to training with ...
David Vernon
wiley +1 more source
Fact-Checking 5G Security: Bridging the Gap Between Expectations and Reality
5G cellular systems are currently being deployed worldwide delivering the promised unprecedented levels of throughput and latency to hundreds of millions of users. At such scale and reach, security is crucial. Consequently, the 5G standard includes a new
Oscar Lasierra +6 more
doaj +1 more source

