Results 181 to 190 of about 13,015 (291)

Integrity verified lightweight ciphering for secure medical image sharing between embedded SoCs. [PDF]

open access: yesSci Rep
Janakiraman S   +5 more
europepmc   +1 more source

Non‐participation in smartphone data collection using research apps

open access: yesJournal of the Royal Statistical Society: Series A (Statistics in Society), Volume 185, Issue S2, Page S225-S245, December 2022., 2022
Abstract Research apps allow to administer survey questions and passively collect smartphone data, thus providing rich information on individual and social behaviours. Agreeing to this novel form of data collection requires multiple consent steps, and little is known about the effect of non‐participation. We invited 4,293 Android smartphone owners from
Florian Keusch   +5 more
wiley   +1 more source

Secure big data collection and processing: Framework, means and opportunities

open access: yesJournal of the Royal Statistical Society: Series A (Statistics in Society), Volume 185, Issue 4, Page 1541-1559, October 2022., 2022
Abstract Statistical disclosure control is important for the dissemination of statistical outputs. There is an increasing need for greater confidentiality protection during data collection and processing by National Statistical Offices. In particular, various transactions and remote sensing signals are examples of useful but very detailed big data that
Li‐Chun Zhang, Gustav Haraldsen
wiley   +1 more source

On Randomness in Hash Functions

open access: yes, 2012
In the talk, we shall discuss quality measures for hash functions used in data structures and algorithms, and survey positive and negative results. (This talk is not about cryptographic hash functions.) For the analysis of algorithms involving hash functions, it is often convenient to assume the hash functions used behave fully randomly; in some cases ...
openaire   +2 more sources

Blockchain enabled traceability in the jewel supply chain. [PDF]

open access: yesSci Rep
Patel A   +4 more
europepmc   +1 more source

Correlated-Input Secure Hash Functions [PDF]

open access: bronze, 2011
Vipul Goyal   +2 more
openalex   +1 more source

Home - About - Disclaimer - Privacy