Results 61 to 70 of about 259,266 (214)

The Discrete Memoryless Multiple Access Channel with Confidential Messages [PDF]

open access: yesarXiv, 2006
A multiple-access channel is considered in which messages from one encoder are confidential. Confidential messages are to be transmitted with perfect secrecy, as measured by equivocation at the other encoder. The upper bounds and the achievable rates for this communication situation are determined.
arxiv  

Confidentiality-Preserving Data Publishing for Credulous Users by Extended Abduction [PDF]

open access: yesarXiv, 2011
Publishing private data on external servers incurs the problem of how to avoid unwanted disclosure of confidential data. We study a problem of confidentiality in extended disjunctive logic programs and show how it can be solved by extended abduction. In particular, we analyze how credulous non-monotonic reasoning affects confidentiality.
arxiv  

Concealing in the Public Interest, or Why We Must Teach Secrecy

open access: yesSecrecy and Society, 2021
Secrecy as the intentional or unintentional concealment of information is the subject of investigation within the humanities, social sciences, journalism, law and legal studies.
Susan Maret
doaj  

Coloured Ring Confidential Transactions [PDF]

open access: yesarXiv, 2018
Privacy in block-chains is considered second to functionality, but a vital requirement for many new applications, e.g., in the industrial environment. We propose a novel transaction type, which enables privacy preserving trading of independent assets on a common block-chain.
arxiv  

De-identification of Electronic Health Records Using Machine Learning Algorithms

open access: yesمجله انفورماتیک سلامت و زیست پزشکی, 2017
Introduction: Electronic Health Record (EHR) contains valuable clinical information that can be useful for activities such as public health surveillance, quality improvement, and research.
Mostafa Langarizadeh, Azam Orooji
doaj  

On the 3-Receiver Broadcast Channel with Degraded Message Sets and Confidential Messages [PDF]

open access: yesarXiv, 2009
In this paper, bounds to the rate-equivocation region for the general 3-receiver broadcast channel (BC) with degraded message sets, are presented for confidential messages to be kept secret from one of the receivers. This model is more general than the 2-receiver BCs with confidential messages with an external wiretapper, and the recently studied 3 ...
arxiv  

Service Experience at Passport Seva Kendra

open access: yesVikalpa, 2021
Richa Saxena, Sapna Popli, Abhishek
doaj   +1 more source

On the Confidentiality of Information Dispersal Algorithms and Their Erasure Codes [PDF]

open access: yesarXiv, 2012
\emph{Information Dispersal Algorithms (IDAs)} have been widely applied to reliable and secure storage and transmission of data files in distributed systems. An IDA is a method that encodes a file $F$ of size $L=|F|$ into $n$ unrecognizable pieces $F_1$, $F_2$, ..., $F_n$, each of size $L/m$ ($m
arxiv  

Home - About - Disclaimer - Privacy