Results 21 to 30 of about 11,028,780 (364)
Fast Implementation of NIST P-256 Elliptic Curve Cryptography on 8-Bit AVR Processor
In this paper, we present a highly optimized implementation of elliptic curve cryptography (ECC) over NIST P-256 curve for an 8-bit AVR microcontroller. For improving the performance of ECC implementation, we focus on optimizing field arithmetics.
Dong-won Park+3 more
doaj +1 more source
A blockchain-based privacy-preserving transaction scheme with public verification and reliable audit
With the continuous development of Internet of Things, finance, big data and many other fields, blockchain has been widely used in these areas for transactions, data sharing, product traceability and so on. Numerous assets have appeared in the blockchain,
Shuang Yao , Dawei Zhang
doaj +1 more source
Information Privacy/Information Property [PDF]
From most objective standpoints, protecting information privacy though industry self-regulation is an abject failure. The current political climate has been hostile to proposals for meaningful privacy regulation. Privacy advocates have been casting around for some third alternative and a number of them have fastened on the idea that data privacy can be
openaire +5 more sources
Rentable CDN Using Blockchain and Proof of Provenance
Building a rentable content delivery network (CDN), a p2p based CDN that supports content control and is composed of hardware rented from consumers, requires significant trust between the renters and consumers.
Suah Kim+2 more
doaj +1 more source
An Exploratory Study on the Taiwanese Primary and Secondary School Teachers’ Understanding of Personal Data Protection Act [PDF]
In this study, the researchers would like to explore Taiwanese primary and secondary school teachers’ understanding on the provisions of the Personal Data Protection Act (hereinafter referred to as “PDPA”).
Mei-Lien Hsueh, Chien Chou
doaj +1 more source
The Japanese sense of information privacy [PDF]
We analyse the contention that privacy is an alien concept within Japanese society, put forward in various presentations of Japanese cultural norms at least as far back as \citet{B46}. In this paper we distinguish between information privacy and physical privacy.
Yohko Orito+2 more
openaire +3 more sources
Recent regulation in the European Union (i.e., the General Data Protection Regulation) affects websites’ information privacy practices. This regulation addresses two dimensions: websites must (1) provide visible notice regarding private information they ...
Rico Bornschein+2 more
semanticscholar +1 more source
With the increasing number of side-channel attacks, countermeasure designers continue to develop various implementations to address such threats. Power-balancing (PB) methods hold the number of 1s and/or transitions (i.e., Hamming weight/distance) of ...
HanBit Kim, HeeSeok Kim, Seokhie Hong
doaj +1 more source
Privacy and Integrity of Medical Information [PDF]
Abstract This chapter explores contemporary regulation of medical privacy in the United States and Europe and its challenges. The need for privacy is a fundamental human necessity. Privacy relates to human beings’ ability to maintain their dignity and avoid disclosure of information that might be deemed unpleasant.
Herveg, Jean, Hoffman, Sharona
openaire +3 more sources
An Informational Theory of Privacy
Abstract Privacy of consumers or citizens is often seen as an inefficient information asymmetry. We challenge this view by showing that privacy can increase welfare in an informational sense. It can also improve information aggregation and prevent inefficient statistical discrimination.
Ole Jann, Christoph Schottmüller
openaire +3 more sources