Results 31 to 40 of about 22,742,798 (333)
The letter to the Editor is in response to the manuscript by Hertzog et al. (2023) titled "Data management instruments to Protect the personal information of Children and Adolescents in sub-Saharan Africa." The letter elaborates on personal data ...
J.H. Smith, JS Horne
doaj +1 more source
Five Common Misconceptions About Privacy-Preserving Internet of Things [PDF]
Billions of devices in the Internet of Things (IoT) collect sensitive data about people, creating data privacy risks and breach vulnerabilities. Accordingly, data privacy preservation is vital for sustaining the proliferation of IoT services. In particular, privacy-preserving IoT connects devices embedded with sensors and maintains the data privacy of ...
arxiv +1 more source
Privacy of Outsourced Data [PDF]
Data outsourced to an external storage server are usually encrypted since there is the common assumption that all data are equally sensitive. The encrypted data however cannot be efficiently queried and their selective release is not possible or require the application of specific solutions.
S. De Capitani di Vimercati, S. Foresti
openaire +2 more sources
From distributed machine learning to federated learning: In the view of data privacy and security [PDF]
Federated learning is an improved version of distributed machine learning that further offloads operations which would usually be performed by a central server.
Sheng Shen+4 more
semanticscholar +1 more source
Deep learning (DL) has exhibited its exceptional performance in fields like intrusion detection. Various augmentation methods have been proposed to improve data quality and eventually to enhance the performance of DL models.
Yixiang Wang+4 more
doaj +1 more source
Balancing smartness and privacy for the Ambient Intelligence [PDF]
Ambient Intelligence (AmI) will introduce large privacy risks. Stored context histories are vulnerable for unauthorized disclosure, thus unlimited storing of privacy-sensitive context data is not desirable from the privacy viewpoint.
Anciaux, Nicolas+3 more
core +7 more sources
Cryptographic identification protocols enable a prover to prove its identity to a verifier. A subclass of such protocols are shared-secret challenge-response identification protocols in which the prover and the verifier share the same secret and the ...
Asghar Hassan Jameel, Kaafar Mohamed Ali
doaj +1 more source
Régimen Jurídico de la acción de acceso a la información pública en el Uruguay
En este artículo se pretende mostrar la importancia del acceso a la información pública, que es un derecho humano fundamental. El estudio se basa en los pilares fundamentales del derecho y las recientes medidas adoptadas por el Estado.
Pablo Schiavi
doaj +1 more source
Statistical Data Privacy: A Song of Privacy and Utility
To quantify trade-offs between increasing demand for open data sharing and concerns about sensitive information disclosure, statistical data privacy (SDP) methodology analyzes data release mechanisms that sanitize outputs based on confidential data. Two dominant frameworks exist: statistical disclosure control (SDC) and the more recent differential ...
Slavkovic, Aleksandra, Seeman, Jeremy
openaire +2 more sources
Lightweight Revocable Hierarchical Attribute-Based Encryption for Internet of Things
The Internet of Things (IoT) is an emerging technology that can benefit from cloud infrastructure. In a cloud-based IoT network, a variety of data is collected by smart devices and transmitted to a cloud server.
Mohammad Ali+2 more
doaj +1 more source