Results 21 to 30 of about 1,504,715 (296)

Privacy and Health Information Technology [PDF]

open access: yes, 2009
The increased use of health information technology (health IT) is a common element of nearly every health reform proposal because it has the potential to decrease costs, improve health outcomes, coordinate care, and improve public health.
Deven McGraw   +3 more
core   +2 more sources

A Combined Single Trace Attack on Global Shuffling Long Integer Multiplication and its Novel Countermeasure

open access: yesIEEE Access, 2020
Advanced collision-based single trace attacks which can be applied on simple power analysis resistant scalar multiplications become virtual threat on elliptic curve cryptosystems recently as their practical experimental results are increasingly reported ...
Sangyub Lee   +3 more
doaj   +1 more source

Balancing Personal Privacy and Public Safety During COVID-19: The Case of South Korea

open access: yesIEEE Access, 2020
There has been vigorous debate on how different countries responded to the COVID-19 pandemic. To secure public safety, South Korea actively used personal information at the risk of personal privacy whereas France encouraged voluntary cooperation at the ...
Na Young Ahn   +3 more
doaj   +1 more source

A preimage attack on reduced GIMLI‐HASH with unbalanced squeezing phase

open access: yesIET Information Security, 2023
In Conference on Cryptographic Hardware and Embedded System 2017, Bernstein et al. proposed GIMLI, a 384‐bit permutation with 24 rounds, which aims to provide high performance on various platforms.
Yongseong Lee   +3 more
doaj   +1 more source

Classification of 4-bit S-Boxes for BOGI Permutation

open access: yesIEEE Access, 2020
Bad Output must go to Good Input (BOGI) is the primary design strategy of GIFT, a lightweight block cipher that was presented at CHES 2017. Because this strategy obviates the need to adhere to the required conditions of S-boxes when adopting bit ...
Seonggyeom Kim   +3 more
doaj   +1 more source

Cybersecurity and Privacy Risk Assessment of Point-of-Care Systems in Healthcare—A Use Case Approach

open access: yesApplied Sciences, 2021
Point-of-care systems are generally used in healthcare to respond rapidly and prevent critical health conditions. Hence, POC systems often handle personal health information; and consequently, their cybersecurity and privacy requirements are of crucial ...
Marc Jofre   +6 more
doaj   +1 more source

Development and Analysis of Deterministic Privacy-Preserving Policies Using Non-Stochastic Information Theory [PDF]

open access: yes, 2019
A deterministic privacy metric using non-stochastic information theory is developed. Particularly, minimax information is used to construct a measure of information leakage, which is inversely proportional to the measure of privacy.
Farokhi, Farhad
core   +2 more sources

Bounded-Leakage Differential Privacy [PDF]

open access: yes, 2020
We introduce and study a relaxation of differential privacy [Dwork et al., 2006] that accounts for mechanisms that leak some additional, bounded information about the database.
Ligett, Katrina   +2 more
core   +1 more source

Highly Efficient SCA-Resistant Binary Field Multiplication on 8-Bit AVR Microcontrollers

open access: yesApplied Sciences, 2020
Binary field ( B F ) multiplication is a basic and important operation for widely used crypto algorithms such as the GHASH function of GCM (Galois/Counter Mode) mode and NIST-compliant binary Elliptic Curve Cryptosystems (ECCs). Recently, Seo et al.
Seog Chung Seo, Donggeun Kwon
doaj   +1 more source

Differential Privacy: on the trade-off between Utility and Information Leakage [PDF]

open access: yes, 2011
Differential privacy is a notion of privacy that has become very popular in the database community. Roughly, the idea is that a randomized query mechanism provides sufficient privacy protection if the ratio between the probabilities that two adjacent ...
Alvim, Mário S.   +4 more
core   +6 more sources

Home - About - Disclaimer - Privacy