Results 41 to 50 of about 969,675 (223)
Multi-agent systems (MASs) have gained a lot of interest recently, due to their ability to solve problems that are difficult or even impossible for an individual agent. However, an important procedure that needs attention in designing multi-agent systems,
Mostefa Kara+5 more
doaj +1 more source
Max Weber and the Problematic Issue of Confidentiality in International Politics
What are the reasons that lead Max Weber to be a convinced promoter of publicity in the practices of internal politics and, by contrast, advocate secret procedures in international affairs? The analysis aims at clarifying the different arguments utilised
Cristiana Senigaglia
doaj +1 more source
Ethical standards in pediatrics: who is a “good pediatrician”?
This article discusses the issues of modern ethical standards in pediatrics, considers the essence of the concept “a good pediatrician”. The key components of the practical professional activity of a pediatrician, such as honesty and integrity ...
H.V. Beketova+4 more
doaj +1 more source
Distributed Function Computation with Confidentiality
A set of terminals observe correlated data and seek to compute functions of the data using interactive public communication. At the same time, it is required that the value of a private function of the data remains concealed from an eavesdropper ...
Tyagi, Himanshu
core +1 more source
Vulnerabilities and Limitations of MQTT Protocol Used between IoT Devices
With the proliferation of smart devices capable of communicating over a network using different protocols, each year more and more successful attacks are recorded against these, underlining the necessity of developing and implementing mechanisms to ...
Dan Dinculeană, Xiaochun Cheng
doaj +1 more source
Patterned Cipher Block for Low-Latency Secure Communication
Despite the increasing importance of network security, increasing Internet of Things (IoT) uptake and traffic tends to apply tighter resource constraints for cryptography.
Seounghwan Oh+2 more
doaj +1 more source
Substance Use Disorder Treatment Confidentiality Boot Camp [PDF]
[Excerpt]: INTRODUCTION: The Health Law and Policy Programs at UNH School of Law, Institute for Health Policy and Practice, and the NH Citizens Health Initiative have contracted with several of the New Hampshire Building Capacity for Transformation ...
Cameron, Stephanie+4 more
core +1 more source
Data Confidentiality in Mobile Ad hoc Networks [PDF]
Mobile ad hoc networks (MANETs) are self-configuring infrastructure-less networks comprised of mobile nodes that communicate over wireless links without any central control on a peer-to-peer basis.
Al-Bayatti, Ali+3 more
core +2 more sources
PROPYLA: Privacy Preserving Long-Term Secure Storage
An increasing amount of sensitive information today is stored electronically and a substantial part of this information (e.g., health records, tax data, legal documents) must be retained over long time periods (e.g., several decades or even centuries ...
Bayer Dave+9 more
core +1 more source
Composing security protocols: from confidentiality to privacy [PDF]
Security protocols are used in many of our daily-life applications, and our privacy largely depends on their design. Formal verification techniques have proved their usefulness to analyse these protocols, but they become so complex that modular ...
Arapinis, Myrto+2 more
core +3 more sources