Results 241 to 250 of about 672,157 (285)
Some of the next articles are maybe not open access.

Generating evidence on privacy outcomes to inform privacy risk management: A way forward?

Journal of Biomedical Informatics, 2023
Effective and efficient privacy risk management (PRM) is a necessary condition to support digitalization in health care and secondary use of patient data in research. To reduce privacy risks, current PRM frameworks are rooted in an approach trying to reduce undesired technical/organizational outcomes such as broken encryption or unintentional data ...
Strech, D.   +4 more
openaire   +3 more sources

Distributed Forward Checking May Lie for Privacy

2007
DisFC is an ABT-like algorithm that, instead of sending the value taken by the high priority agent, it sends the domain of the low priority agent that is compatible with that value. With this strategy, plus the use of sequence numbers, some privacy level is achieved.
Ismel Brito, Pedro Meseguer
openaire   +1 more source

Looking Forward With The Right Of Privacy

SSRN Electronic Journal, 2000
Where is the right of privacy today? The uncertainty and controversy regarding the present and future of personal liberties protected by the Constitution was sharply evident in the recent advocacy and debate regarding the constitutionality of state bans against physician-assisted suicide.
openaire   +1 more source

Leakage-Resilient RFID Authentication with Forward-Privacy

2010
Low power devices, such as smart-card and RFID-tags, will be used around our life including in commercial and financial activities. A prime application of such devices is entity authentication in pervasive environment. The obvious concerns in this environment involves getting security against tag-forgery (even by adversary controlled readers) and, on ...
Shin’ichiro Matsuo   +3 more
openaire   +1 more source

Cooperative Data Forwarding Strategy with Privacy Preservation

2013
In the MSN, users rely on the opportunistic contacts for cooperative data forwarding. Unlike conventional wireless relay networks assuming end-device to be insensate, users have specific social features, e.g., privacy concerns and selfishness, and they will choose a data forwarding strategy under the impacts of these features. For example, when privacy
Xiaohui Liang   +3 more
openaire   +1 more source

Investigating the Privacy versus Forwarding Accuracy Tradeoff in OpportunisticInterest-Casting

IEEE Transactions on Mobile Computing, 2014
Many mobile social networking applications are based on a "friend proximity detection" step, according to which two mobile users try to jointly estimate whether they have friends in common. Preserving privacy while performing "friend proximity detection" is fundamental to achieve widespread acceptance of mobile social networking applications.
Gianpiero Costantino   +2 more
openaire   +4 more sources

FastRIPP: RFID Privacy Preserving protocol with Forward Secrecy and Fast Resynchronisation

IECON 2007 - 33rd Annual Conference of the IEEE Industrial Electronics Society, 2007
In the next future radio frequency identiflcation (RFID) systems will be so pervasive that everyone will wear (maybe unawares) a kit of personal tags. However, a major concern that prevents a wide diffusion of this emerging technology is privacy. Several proposed protocols try to solve the privacy issue, but are exposed to many others security flaws ...
CONTI, MAURO   +3 more
openaire   +2 more sources

RIPP-FS: An RFID Identification, Privacy Preserving Protocol with Forward Secrecy.

Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07), 2007
This paper presents a new RFID identification protocol: RIPP-FS. The proposed protocol is based on hash chains and it enforces privacy and forward secrecy. Further, unlike other protocols based on hash chains, our proposal is resilient to a specific DoS attack, in which the attacker attempts to exhaust the hash chain the tag is programmed to spend. The
Conti, Mauro   +3 more
openaire   +3 more sources

Forward Privacy Analysis of a Dynamic Searchable Encryption Scheme

2020
Dynamic searchable encryption is one branch of searchable encryption. Compared with the static searchable encryption, a dynamic searchable encryption scheme can support update (add or delete) of outsourced data. However, this kind of operation may cause data leakage.
Zhuoyu Tie   +3 more
openaire   +1 more source

Verifiable Blockchain-Based Searchable Encryption with forward and backward privacy

2020 16th International Conference on Mobility, Sensing and Networking (MSN), 2020
Symmetric Searchable Encryption (SSE) is an ideal technology to secure searches. SSE is dedicated to improving data confidentiality without sacrificing the searchability of data. Currently, most SSE schemes work using a semihonest or curious cloud server model in which the search results are not absolutely trustworthy. Therefore, a verifiable SSE (VSSE)
Ruizhong Du, Yi Wang
openaire   +1 more source

Home - About - Disclaimer - Privacy