Results 31 to 40 of about 22,742,798 (333)

Data privacy and DNA data

open access: yesIASSIST Quarterly, 2023
The letter to the Editor is in response to the manuscript by Hertzog et al. (2023) titled "Data management instruments to Protect the personal information of Children and Adolescents in sub-Saharan Africa." The letter elaborates on personal data ...
J.H. Smith, JS Horne
doaj   +1 more source

Five Common Misconceptions About Privacy-Preserving Internet of Things [PDF]

open access: yes, 2023
Billions of devices in the Internet of Things (IoT) collect sensitive data about people, creating data privacy risks and breach vulnerabilities. Accordingly, data privacy preservation is vital for sustaining the proliferation of IoT services. In particular, privacy-preserving IoT connects devices embedded with sensors and maintains the data privacy of ...
arxiv   +1 more source

Privacy of Outsourced Data [PDF]

open access: yes, 2010
Data outsourced to an external storage server are usually encrypted since there is the common assumption that all data are equally sensitive. The encrypted data however cannot be efficiently queried and their selective release is not possible or require the application of specific solutions.
S. De Capitani di Vimercati, S. Foresti
openaire   +2 more sources

From distributed machine learning to federated learning: In the view of data privacy and security [PDF]

open access: yesConcurrency and Computation, 2020
Federated learning is an improved version of distributed machine learning that further offloads operations which would usually be performed by a central server.
Sheng Shen   +4 more
semanticscholar   +1 more source

On the combination of data augmentation method and gated convolution model for building effective and robust intrusion detection

open access: yesCybersecurity, 2020
Deep learning (DL) has exhibited its exceptional performance in fields like intrusion detection. Various augmentation methods have been proposed to improve data quality and eventually to enhance the performance of DL models.
Yixiang Wang   +4 more
doaj   +1 more source

Balancing smartness and privacy for the Ambient Intelligence [PDF]

open access: yes, 2006
Ambient Intelligence (AmI) will introduce large privacy risks. Stored context histories are vulnerable for unauthorized disclosure, thus unlimited storing of privacy-sensitive context data is not desirable from the privacy viewpoint.
Anciaux, Nicolas   +3 more
core   +7 more sources

When are identification protocols with sparse challenges safe? The case of the Coskun and Herley attack

open access: yesJournal of Mathematical Cryptology, 2017
Cryptographic identification protocols enable a prover to prove its identity to a verifier. A subclass of such protocols are shared-secret challenge-response identification protocols in which the prover and the verifier share the same secret and the ...
Asghar Hassan Jameel, Kaafar Mohamed Ali
doaj   +1 more source

Régimen Jurídico de la acción de acceso a la información pública en el Uruguay

open access: yesRevista do Direito, 2016
En este artículo se pretende mostrar la importancia del acceso a la información pública, que es un derecho humano fundamental. El estudio se basa en los pilares fundamentales del derecho y las recientes medidas adoptadas por el Estado.
Pablo Schiavi
doaj   +1 more source

Statistical Data Privacy: A Song of Privacy and Utility

open access: yesAnnual Review of Statistics and Its Application, 2023
To quantify trade-offs between increasing demand for open data sharing and concerns about sensitive information disclosure, statistical data privacy (SDP) methodology analyzes data release mechanisms that sanitize outputs based on confidential data. Two dominant frameworks exist: statistical disclosure control (SDC) and the more recent differential ...
Slavkovic, Aleksandra, Seeman, Jeremy
openaire   +2 more sources

Lightweight Revocable Hierarchical Attribute-Based Encryption for Internet of Things

open access: yesIEEE Access, 2020
The Internet of Things (IoT) is an emerging technology that can benefit from cloud infrastructure. In a cloud-based IoT network, a variety of data is collected by smart devices and transmitted to a cloud server.
Mohammad Ali   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy