Results 41 to 50 of about 969,675 (223)

A Secure Multi-Agent-Based Decision Model Using a Consensus Mechanism for Intelligent Manufacturing Tasks

open access: yesEngineering Proceedings, 2023
Multi-agent systems (MASs) have gained a lot of interest recently, due to their ability to solve problems that are difficult or even impossible for an individual agent. However, an important procedure that needs attention in designing multi-agent systems,
Mostefa Kara   +5 more
doaj   +1 more source

Max Weber and the Problematic Issue of Confidentiality in International Politics

open access: yesRedescriptions, 2023
What are the reasons that lead Max Weber to be a convinced promoter of publicity in the practices of internal politics and, by contrast, advocate secret procedures in international affairs? The analysis aims at clarifying the different arguments utilised
Cristiana Senigaglia
doaj   +1 more source

Ethical standards in pediatrics: who is a “good pediatrician”?

open access: yesZdorovʹe Rebenka, 2023
This article discusses the issues of modern ethical standards in pediatrics, considers the essence of the concept “a good pediatrician”. The key components of the practical professional activity of a pediatrician, such as honesty and integrity ...
H.V. Beketova   +4 more
doaj   +1 more source

Distributed Function Computation with Confidentiality

open access: yes, 2013
A set of terminals observe correlated data and seek to compute functions of the data using interactive public communication. At the same time, it is required that the value of a private function of the data remains concealed from an eavesdropper ...
Tyagi, Himanshu
core   +1 more source

Vulnerabilities and Limitations of MQTT Protocol Used between IoT Devices

open access: yesApplied Sciences, 2019
With the proliferation of smart devices capable of communicating over a network using different protocols, each year more and more successful attacks are recorded against these, underlining the necessity of developing and implementing mechanisms to ...
Dan Dinculeană, Xiaochun Cheng
doaj   +1 more source

Patterned Cipher Block for Low-Latency Secure Communication

open access: yesIEEE Access, 2020
Despite the increasing importance of network security, increasing Internet of Things (IoT) uptake and traffic tends to apply tighter resource constraints for cryptography.
Seounghwan Oh   +2 more
doaj   +1 more source

Substance Use Disorder Treatment Confidentiality Boot Camp [PDF]

open access: yes, 2017
[Excerpt]: INTRODUCTION: The Health Law and Policy Programs at UNH School of Law, Institute for Health Policy and Practice, and the NH Citizens Health Initiative have contracted with several of the New Hampshire Building Capacity for Transformation ...
Cameron, Stephanie   +4 more
core   +1 more source

Data Confidentiality in Mobile Ad hoc Networks [PDF]

open access: yes, 2012
Mobile ad hoc networks (MANETs) are self-configuring infrastructure-less networks comprised of mobile nodes that communicate over wireless links without any central control on a peer-to-peer basis.
Al-Bayatti, Ali   +3 more
core   +2 more sources

PROPYLA: Privacy Preserving Long-Term Secure Storage

open access: yes, 2018
An increasing amount of sensitive information today is stored electronically and a substantial part of this information (e.g., health records, tax data, legal documents) must be retained over long time periods (e.g., several decades or even centuries ...
Bayer Dave   +9 more
core   +1 more source

Composing security protocols: from confidentiality to privacy [PDF]

open access: yes, 2014
Security protocols are used in many of our daily-life applications, and our privacy largely depends on their design. Formal verification techniques have proved their usefulness to analyse these protocols, but they become so complex that modular ...
Arapinis, Myrto   +2 more
core   +3 more sources

Home - About - Disclaimer - Privacy