Results 21 to 30 of about 9,826,920 (308)

Information Privacy/Information Property [PDF]

open access: yesSSRN Electronic Journal, 2000
From most objective standpoints, protecting information privacy though industry self-regulation is an abject failure. The current political climate has been hostile to proposals for meaningful privacy regulation. Privacy advocates have been casting around for some third alternative and a number of them have fastened on the idea that data privacy can be
openaire   +5 more sources

Fast Implementation of NIST P-256 Elliptic Curve Cryptography on 8-Bit AVR Processor

open access: yesApplied Sciences, 2020
In this paper, we present a highly optimized implementation of elliptic curve cryptography (ECC) over NIST P-256 curve for an 8-bit AVR microcontroller. For improving the performance of ECC implementation, we focus on optimizing field arithmetics.
Dong-won Park   +3 more
doaj   +1 more source

Problem of Personal Data Security and the Phenomenon of Post-Privacy in the Digital Society [PDF]

open access: yesГуманитарный вектор, 2022
The purpose of the article is to conceptualize the changes that are taking place in the perception of information privacy in today’s digital society. The relevance of the work is due to the development of modern information and communication technologies,
Lesya V. Chesnokova
doaj   +1 more source

The Japanese sense of information privacy [PDF]

open access: yesAI & SOCIETY, 2009
We analyse the contention that privacy is an alien concept within Japanese society, put forward in various presentations of Japanese cultural norms at least as far back as \citet{B46}. In this paper we distinguish between information privacy and physical privacy.
Yohko Orito   +2 more
openaire   +2 more sources

Power-Balancing Software Implementation to Mitigate Side-Channel Attacks without Using Look-Up Tables

open access: yesApplied Sciences, 2020
With the increasing number of side-channel attacks, countermeasure designers continue to develop various implementations to address such threats. Power-balancing (PB) methods hold the number of 1s and/or transitions (i.e., Hamming weight/distance) of ...
HanBit Kim, HeeSeok Kim, Seokhie Hong
doaj   +1 more source

The Effect of Consumers’ Perceived Power and Risk in Digital Information Privacy: The Example of Cookie Notices

open access: yesJournal of Public Policy & Marketing JPP&M, 2020
Recent regulation in the European Union (i.e., the General Data Protection Regulation) affects websites’ information privacy practices. This regulation addresses two dimensions: websites must (1) provide visible notice regarding private information they ...
Rico Bornschein   +2 more
semanticscholar   +1 more source

Privacy and Integrity of Medical Information [PDF]

open access: yes, 2020
Abstract This chapter explores contemporary regulation of medical privacy in the United States and Europe and its challenges. The need for privacy is a fundamental human necessity. Privacy relates to human beings’ ability to maintain their dignity and avoid disclosure of information that might be deemed unpleasant.
Herveg, Jean, Hoffman, Sharona
openaire   +3 more sources

An Informational Theory of Privacy

open access: yesSSRN Electronic Journal, 2016
Abstract Privacy of consumers or citizens is often seen as an inefficient information asymmetry. We challenge this view by showing that privacy can increase welfare in an informational sense. It can also improve information aggregation and prevent inefficient statistical discrimination.
Ole Jann, Christoph Schottmüller
openaire   +3 more sources

Delivering Smart Governance in a Future City: The Case of Glasgow

open access: yesMedia and Communication, 2018
In 2013, Glasgow City Council received significant funding to develop innovative smart city applications, including the delivery of new electronic public services and the co-production of governance.
Charles Leleux, C. William R. Webster
doaj   +1 more source

Quantum Differential Privacy: An Information Theory Perspective [PDF]

open access: yesIEEE Transactions on Information Theory, 2022
Differential privacy has been an exceptionally successful concept when it comes to providing provable security guarantees for classical computations. More recently, the concept was generalized to quantum computations.
Christoph Hirche   +2 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy