Results 21 to 30 of about 259,266 (214)
Efficient SSE With Forward ID-Privacy and Authentication in the Multi-Data-Owner Settings
Based on Sun et al.'s multi-client symmetric searchable encryption (SSE) scheme (at ESORICS 2016), and combining Zhao's identity-concealed authenticated encryption (CCS 2016), a new SSE scheme with multi-data-owner functionalities is proposed. By setting
Huige Wang+3 more
doaj +1 more source
Recently several proposals of blockchain-based solutions for traditional e-commerce applications have been presented, taking advantage of the fact that blockchain is a technology that offers an immutable registry of data.
Macia Mut-Puigserver+2 more
doaj +1 more source
Patterned Cipher Block for Low-Latency Secure Communication
Despite the increasing importance of network security, increasing Internet of Things (IoT) uptake and traffic tends to apply tighter resource constraints for cryptography.
Seounghwan Oh+2 more
doaj +1 more source
The features of decentralization and tamper-proof enable blockchain to be an emerging technology for integrity protection of important data stored on it.
Lifeng Guo, Xiaoli Yang, Wei-Chuen Yau
doaj +1 more source
This article debates the tension that exists between confidentiality, usual in ADRs, and the publicity principle, that rules the Public Administration in Brazil.
Carlos Alberto de Salles
doaj +1 more source
Efficient Security Mechanisms for mHealth Applications Using Wireless Body Sensor Networks
Recent technological advances in wireless communications and physiological sensing allow miniature, lightweight, ultra-low power, intelligent monitoring devices, which can be integrated into a Wireless Body Sensor Network (WBSN) for health monitoring ...
Prasan Kumar Sahoo
doaj +1 more source
Confidential Care for Adolescents in the U.S. Health Care System
In providing care for adolescents, maintaining confidentiality should be considered a human right and an evidence-based component of quality care. Unfortunately, complexities in the U.S.
Priya R. Pathak, Adriana Chou
doaj +1 more source
We describe the launching of the Society for Privacy and Confidentiality Research (SPCR). SPCR is the new owner of the Journal of Privacy and Confidentiality, with the goal of ensuring a sustainable future for the Journal, and continuing to publish the ...
John M. Abowd+6 more
doaj +1 more source
Privacy and Cryptocurrencies—A Systematic Literature Review
Our transaction history in the current centralized banking system has the ability to reveal a lot of private information for each spender, both to the banking system itself, but also to those entities that surround it (e.g., governments, industry etc ...
Lasse Herskind+2 more
doaj +1 more source
Tool-Supported Architecture-Based Data Flow Analysis for Confidentiality [PDF]
Through the increasing interconnection between various systems, the need for confidential systems is increasing. Confidential systems share data only with authorized entities. However, estimating the confidentiality of a system is complex, and adjusting an already deployed software is costly.
arxiv