Results 1 to 10 of about 796,494 (219)

Confidentiality-Preserving Publish/Subscribe [PDF]

open access: yesACM Computing Surveys, 2016
Publish/subscribe (pub/sub) is an attractive communication paradigm for large-scale distributed applications running across multiple administrative domains.
Emanuel Onica   +3 more
semanticscholar   +3 more sources

Confidentiality [PDF]

open access: yes, 2009
No ...
Benatar, D
core   +3 more sources

Privacy and Confidentiality in Process Mining: Threats and Research Challenges [PDF]

open access: yesACM Transactions on Management Information Systems, 2021
Privacy and confidentiality are very important prerequisites for applying process mining to comply with regulations and keep company secrets. This article provides a foundation for future research on privacy-preserving and confidential process mining ...
Gamal Elkoumy   +7 more
semanticscholar   +1 more source

Anti-Jamming Tracking Algorithm for Ship Target Based on Correlation Filtering [PDF]

open access: yesHangkong bingqi, 2023
For solving the problem of tracking drift or loss caused by morphological changes and scale scaling in ship target tracking, this paper designs a target tracking algorithm based on multi feature fusion and threshold selection to resist morphological ...
Qiu Qianjun, Zhou Pengyao, Gao Xin, Zhang Fang, Lü Meibo
doaj   +1 more source

LAWYER CONFIDENTIALITY

open access: yesPravo, 2021
The role of the lawyer is characterized by a focus on counseling, advocacy and conciliation. A lawyer advises a client on legal issues, considers the possibilities of resolving the dispute amicably and certainly advocates in a legal proceedings if this ...
Nenad Bingulac, Dragan Miljenović
doaj   +1 more source

Ekiden: A Platform for Confidentiality-Preserving, Trustworthy, and Performant Smart Contracts [PDF]

open access: yesEuropean Symposium on Security and Privacy, 2018
Smart contracts are applications that execute on blockchains. Today they manage billions of dollars in value and motivate visionary plans for pervasive blockchain deployment. While smart contracts inherit the availability and other security assurances of
Raymond Cheng   +8 more
semanticscholar   +1 more source

Authenticated Encryption Schemes: A Systematic Review

open access: yesIEEE Access, 2022
Authenticated encryption (AE) is a cryptographic construction that simultaneously protects confidentiality and integrity. A considerable amount of research has been devoted to the area since its formal inception in 2000.
Mohamud Ahmed Jimale   +6 more
doaj   +1 more source

Home - About - Disclaimer - Privacy