Results 21 to 30 of about 1,212,365 (214)
Deep learning (DL) has exhibited its exceptional performance in fields like intrusion detection. Various augmentation methods have been proposed to improve data quality and eventually to enhance the performance of DL models.
Yixiang Wang+4 more
doaj +1 more source
Cryptographic identification protocols enable a prover to prove its identity to a verifier. A subclass of such protocols are shared-secret challenge-response identification protocols in which the prover and the verifier share the same secret and the ...
Asghar Hassan Jameel, Kaafar Mohamed Ali
doaj +1 more source
Régimen Jurídico de la acción de acceso a la información pública en el Uruguay
En este artículo se pretende mostrar la importancia del acceso a la información pública, que es un derecho humano fundamental. El estudio se basa en los pilares fundamentales del derecho y las recientes medidas adoptadas por el Estado.
Pablo Schiavi
doaj +1 more source
Lightweight Revocable Hierarchical Attribute-Based Encryption for Internet of Things
The Internet of Things (IoT) is an emerging technology that can benefit from cloud infrastructure. In a cloud-based IoT network, a variety of data is collected by smart devices and transmitted to a cloud server.
Mohammad Ali+2 more
doaj +1 more source
Statistical Data Privacy: A Song of Privacy and Utility
To quantify trade-offs between increasing demand for open data sharing and concerns about sensitive information disclosure, statistical data privacy (SDP) methodology analyzes data release mechanisms that sanitize outputs based on confidential data. Two dominant frameworks exist: statistical disclosure control (SDC) and the more recent differential ...
Slavkovic, Aleksandra, Seeman, Jeremy
openaire +2 more sources
Peer ...
Domingo-Ferrer, Joan, Torra, Vicenç
openaire +3 more sources
Detecting Android Locker-Ransomware on Chinese Social Networks
In recent years, an increasing amount of locker-ransomware has been posing a great threat to the Android platform as well as users' properties. Locker-ransomware blackmails victims for ransom by compulsorily locking the devices.
Dan Su+3 more
doaj +1 more source
Practical Data-in-Use Protection Using Binary Decision Diagrams
Protection of data-in-use, contrary to the protection of data-at-rest or data-in-transit, remains a challenge. Cryptography advances such as Fully Homomorphic Encryption (FHE) provide theoretical, albeit impractical, solutions to functionally-complete ...
Oleg Mazonka+4 more
doaj +1 more source
Privacy Preserving Attribute-Focused Anonymization Scheme for Healthcare Data Publishing
Advancements in Industry 4.0 brought tremendous improvements in the healthcare sector, such as better quality of treatment, enhanced communication, remote monitoring, and reduced cost.
J. Andrew Onesimu+4 more
doaj +1 more source
Privacy in (mobile) telecommunications services [PDF]
Telecommunications services are for long subject to privacy regulations. At stake are traditionally: privacy of the communication and the protection of traffic data. Privacy of the communication is legally founded.
J Hoven van den+4 more
core +1 more source