Results 61 to 70 of about 259,266 (214)
The Discrete Memoryless Multiple Access Channel with Confidential Messages [PDF]
A multiple-access channel is considered in which messages from one encoder are confidential. Confidential messages are to be transmitted with perfect secrecy, as measured by equivocation at the other encoder. The upper bounds and the achievable rates for this communication situation are determined.
arxiv
Confidentiality-Preserving Data Publishing for Credulous Users by Extended Abduction [PDF]
Publishing private data on external servers incurs the problem of how to avoid unwanted disclosure of confidential data. We study a problem of confidentiality in extended disjunctive logic programs and show how it can be solved by extended abduction. In particular, we analyze how credulous non-monotonic reasoning affects confidentiality.
arxiv
Concealing in the Public Interest, or Why We Must Teach Secrecy
Secrecy as the intentional or unintentional concealment of information is the subject of investigation within the humanities, social sciences, journalism, law and legal studies.
Susan Maret
doaj
Coloured Ring Confidential Transactions [PDF]
Privacy in block-chains is considered second to functionality, but a vital requirement for many new applications, e.g., in the industrial environment. We propose a novel transaction type, which enables privacy preserving trading of independent assets on a common block-chain.
arxiv
De-identification of Electronic Health Records Using Machine Learning Algorithms
Introduction: Electronic Health Record (EHR) contains valuable clinical information that can be useful for activities such as public health surveillance, quality improvement, and research.
Mostafa Langarizadeh, Azam Orooji
doaj
On the 3-Receiver Broadcast Channel with Degraded Message Sets and Confidential Messages [PDF]
In this paper, bounds to the rate-equivocation region for the general 3-receiver broadcast channel (BC) with degraded message sets, are presented for confidential messages to be kept secret from one of the receivers. This model is more general than the 2-receiver BCs with confidential messages with an external wiretapper, and the recently studied 3 ...
arxiv
Service Experience at Passport Seva Kendra
Richa Saxena, Sapna Popli, Abhishek
doaj +1 more source
On the Confidentiality of Information Dispersal Algorithms and Their Erasure Codes [PDF]
\emph{Information Dispersal Algorithms (IDAs)} have been widely applied to reliable and secure storage and transmission of data files in distributed systems. An IDA is a method that encodes a file $F$ of size $L=|F|$ into $n$ unrecognizable pieces $F_1$, $F_2$, ..., $F_n$, each of size $L/m$ ($m
arxiv