Results 11 to 20 of about 11,028,780 (364)
Notes on information-theoretic privacy [PDF]
We investigate the tradeoff between privacy and utility in a situation where both privacy and utility are measured in terms of mutual information. For the binary case, we fully characterize this tradeoff in case of perfect privacy and also give an upper-bound for the case where some privacy leakage is allowed.
Fady Alajaji+2 more
openaire +5 more sources
Privacy and Health Information Technology [PDF]
The increased use of health information technology (health IT) is a common element of nearly every health reform proposal because it has the potential to decrease costs, improve health outcomes, coordinate care, and improve public health.
Deven McGraw
openalex +4 more sources
Deep Learning with Differential Privacy [PDF]
Machine learning techniques based on neural networks are achieving remarkable results in a wide variety of domains. Often, the training of models requires large, representative datasets, which may be crowdsourced and contain sensitive information.
Martín Abadi+6 more
semanticscholar +1 more source
Integral Cryptanalysis of Lightweight Block Cipher PIPO
PIPO is a lightweight block cipher proposed at ICISC 2020, which has a byte-oriented structure suitable for bit-sliced implementation and allows for efficient higher-order masking implementations.
Sunyeop Kim+5 more
doaj +1 more source
On the Performance Analysis for CSIDH-Based Cryptosystems
In this paper, we present the performance and security analysis for various commutative SIDH (CSIDH)-based algorithms. As CSIDH offers a smaller key size than SIDH and provides a relatively efficient signature scheme, numerous CSIDH-based key exchange ...
Donghoe Heo+3 more
doaj +1 more source
Improved Ciphertext-Only Attack on GMR-1
The GEO-Mobile Radio Interface-1 (GMR-1) is a satellite communication standard used in Thuraya, a United Arab Emirates-based regional mobile satellite service provider.
Dongjae Lee+4 more
doaj +1 more source
Information Privacy, Cultural Values, and Regulatory Preferences
The global nature of e-commerce is complicating privacy issues because perceptions of privacy, trust, risk, and fair information practices vary across cultures, and differences in national regulation create challenges for global information management ...
John Benamati+2 more
semanticscholar +1 more source
Camouflage Backdoor Attack against Pedestrian Detection
Pedestrian detection models in autonomous driving systems heavily rely on deep neural networks (DNNs) to perceive their surroundings. Recent research has unveiled the vulnerability of DNNs to backdoor attacks, in which malicious actors manipulate the ...
Yalun Wu+9 more
doaj +1 more source
Optimized CSIDH Implementation Using a 2-Torsion Point
The implementation of isogeny-based cryptography mainly use Montgomery curves, as they offer fast elliptic curve arithmetic and isogeny computation. However, although Montgomery curves have efficient 3- and 4-isogeny formula, it becomes inefficient when ...
Donghoe Heo+4 more
doaj +1 more source
"The dearest of our possessions": applying Floridi's information privacy concept in models of information behavior and information literacy [PDF]
This conceptual paper argues for the value of an approach to privacy in the digital information environment informed by Luciano Floridi's philosophy of information and information ethics.
Bawden D.+25 more
core +1 more source