Results 51 to 60 of about 259,266 (214)
Gaussian MIMO Broadcast Channels with Common and Confidential Messages [PDF]
We study the two-user Gaussian multiple-input multiple-output (MIMO) broadcast channel with common and confidential messages. In this channel, the transmitter sends a common message to both users, and a confidential message to each user which is kept perfectly secret from the other user. We obtain the entire capacity region of this channel.
arxiv
CoVE: Towards Confidential Computing on RISC-V Platforms [PDF]
Multi-tenant computing platforms are typically comprised of several software and hardware components including platform firmware, host operating system kernel, virtualization monitor, and the actual tenant payloads that run on them (typically in a virtual machine, container, or application).
arxiv
Quantitative Metrics and Risk Assessment: The Three Tenets Model of Cybersecurity [PDF]
Progress in operational cybersecurity has been difficult to demonstrate. In spite of the considerable research and development investments made for more than 30 years, many government, industrial, financial, and consumer information systems continue to ...
Jeff Hughes, George Cybenko
doaj
A Review of: Magi, Trina J., “The Gap between Theory and Practice: A Study of the Prevalence and Strength of Patron Confidentiality Policies in Public and Academic Libraries.” Library & Information Science Research 29 (2007): 455-70 ...
Stephanie Walker
doaj +1 more source
The Future of the Journal of Privacy and Confidentiality
The Journal of Privacy and Confidentiality (JPC) is the only journal to actively solicit contributions from the multi-faceted community of researchers and practitioners for whom privacy is a primary intellectual or operational concern, for dissemination ...
Cynthia Dwork
doaj +1 more source
Physicians’ Attitudes toward Adolescent Confidentiality Services: Scale Development and Validation
Confidentiality is one of the oldest ethical principles in healthcare. However, confidentiality in adolescent healthcare is not a universally-accepted doctrine among scholars.
Jeremić Stojković Vida+2 more
doaj +1 more source
Relay Broadcast Channel with Confidential Messages [PDF]
We investigate the effects of an additional relay node on the secrecy of broadcast channels by considering the model of relay broadcast channels with confidential messages. We show that this additional relay node can increase the achievable secrecy rate region of the broadcast channels with confidential messages.
arxiv
Central Questions of Anonymization: A Case Study of Secondary Use of Qualitative Data
Anonymization—the removal of identifying information from data—is one way of preparing data for secondary use. This process has not received much attention from scholars, but close examination shows that it is full of methodological, ethical and ...
Denise Thomson+4 more
doaj
Incidental findings (IFs) are well known in medical research and clinical practice as unexpected findings having potential health or reproductive importance for an individual.
Luciana Caenazzo+2 more
doaj +1 more source
The South African Government’s National Cybersecurity Policy Framework (NCPF) of 2012 provides for the establishment of a national computer security incident response team (CSIRT) in the form of the National Cybersecurity Hub—more correctly referred to ...
Morné Pretorius, Hombakazi Ngejane
doaj +1 more source