Results 11 to 20 of about 1,497,806 (238)

Assessment of verbal interaction in Chinese classroom using social network analysis [PDF]

open access: yesPeerJ Computer Science
Background The global growth in Chinese language learners presents systematic challenges to Chinese classroom interaction evaluation. Key limitations include inadequate accuracy in speech recognition and shallow interaction analysis.
Li Zhang   +5 more
doaj   +2 more sources

Data privacy and DNA data

open access: yesIASSIST Quarterly, 2023
The letter to the Editor is in response to the manuscript by Hertzog et al. (2023) titled "Data management instruments to Protect the personal information of Children and Adolescents in sub-Saharan Africa." The letter elaborates on personal data ...
J.H. Smith, JS Horne
doaj   +1 more source

Privacy in (mobile) telecommunications services [PDF]

open access: yes, 2005
Telecommunications services are for long subject to privacy regulations. At stake are traditionally: privacy of the communication and the protection of traffic data. Privacy of the communication is legally founded.
J Hoven van den   +4 more
core   +1 more source

New Program Abstractions for Privacy [PDF]

open access: yes, 2020
Static program analysis, once seen primarily as a tool for optimising programs, is now increasingly important as a means to provide quality guarantees about programs. One measure of quality is the extent to which programs respect the privacy of user data.
C Dwork   +5 more
core   +1 more source

On the combination of data augmentation method and gated convolution model for building effective and robust intrusion detection

open access: yesCybersecurity, 2020
Deep learning (DL) has exhibited its exceptional performance in fields like intrusion detection. Various augmentation methods have been proposed to improve data quality and eventually to enhance the performance of DL models.
Yixiang Wang   +4 more
doaj   +1 more source

When are identification protocols with sparse challenges safe? The case of the Coskun and Herley attack

open access: yesJournal of Mathematical Cryptology, 2017
Cryptographic identification protocols enable a prover to prove its identity to a verifier. A subclass of such protocols are shared-secret challenge-response identification protocols in which the prover and the verifier share the same secret and the ...
Asghar Hassan Jameel, Kaafar Mohamed Ali
doaj   +1 more source

Régimen Jurídico de la acción de acceso a la información pública en el Uruguay

open access: yesRevista do Direito, 2016
En este artículo se pretende mostrar la importancia del acceso a la información pública, que es un derecho humano fundamental. El estudio se basa en los pilares fundamentales del derecho y las recientes medidas adoptadas por el Estado.
Pablo Schiavi
doaj   +1 more source

Machine-Readable Privacy Certificates for Services [PDF]

open access: yes, 2013
Privacy-aware processing of personal data on the web of services requires managing a number of issues arising both from the technical and the legal domain.
A. Cavoukian   +13 more
core   +1 more source

Quantifying Differential Privacy in Continuous Data Release under Temporal Correlations [PDF]

open access: yes, 2019
Differential Privacy (DP) has received increasing attention as a rigorous privacy framework. Many existing studies employ traditional DP mechanisms (e.g., the Laplace mechanism) as primitives to continuously release private data for protecting privacy at
Cao, Yang   +3 more
core   +2 more sources

Lightweight Revocable Hierarchical Attribute-Based Encryption for Internet of Things

open access: yesIEEE Access, 2020
The Internet of Things (IoT) is an emerging technology that can benefit from cloud infrastructure. In a cloud-based IoT network, a variety of data is collected by smart devices and transmitted to a cloud server.
Mohammad Ali   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy