Results 31 to 40 of about 9,826,920 (308)
An Exploratory Study on the Taiwanese Primary and Secondary School Teachers’ Understanding of Personal Data Protection Act [PDF]
In this study, the researchers would like to explore Taiwanese primary and secondary school teachers’ understanding on the provisions of the Personal Data Protection Act (hereinafter referred to as “PDPA”).
Mei-Lien Hsueh, Chien Chou
doaj +1 more source
Single Trace Side Channel Analysis on NTRU Implementation
As researches on the quantum computer have progressed immensely, interests in post-quantum cryptography have greatly increased. NTRU is one of the well-known algorithms due to its practical key sizes and fast performance along with the resistance against
Soojung An +4 more
doaj +1 more source
A Multi-Component Analysis of CPTED in the Cyberspace Domain
The visual fidelity of a virtual environment lacks the exceedingly complex layers from the physical world, but the continuous improvements of image rendering technology and computation powers have led to greater demands for virtual simulations. Our study
Jemin Justin Lee +7 more
doaj +1 more source
Privacy constrained information processing [PDF]
will appear in CDC ...
Tamer Basar +2 more
openaire +2 more sources
Forensic Issues and Techniques to Improve Security in SSD With Flex Capacity Feature
Over-provisioning technology is typically introduced as a means to improve the performance of storage systems, such as databases. The over-provisioning area is both hidden and difficult for normal users to access.
Na Young Ahn, Dong Hoon Lee
doaj +1 more source
Notes on information-theoretic privacy [PDF]
We investigate the tradeoff between privacy and utility in a situation where both privacy and utility are measured in terms of mutual information. For the binary case, we fully characterize this tradeoff in case of perfect privacy and also give an upper-bound for the case where some privacy leakage is allowed.
Fady Alajaji +2 more
openaire +3 more sources
Advanced collision-based single trace attacks which can be applied on simple power analysis resistant scalar multiplications become virtual threat on elliptic curve cryptosystems recently as their practical experimental results are increasingly reported ...
Sangyub Lee +3 more
doaj +1 more source
A preimage attack on reduced GIMLI‐HASH with unbalanced squeezing phase
In Conference on Cryptographic Hardware and Embedded System 2017, Bernstein et al. proposed GIMLI, a 384‐bit permutation with 24 rounds, which aims to provide high performance on various platforms.
Yongseong Lee +3 more
doaj +1 more source
Privacy and artificial intelligence: challenges for protecting health information in a new era
Advances in healthcare artificial intelligence (AI) are occurring rapidly and there is a growing discussion about managing its development. Many AI technologies end up owned and controlled by private entities. The nature of the implementation of AI could
Blake Murdoch
semanticscholar +1 more source
Balancing Personal Privacy and Public Safety During COVID-19: The Case of South Korea
There has been vigorous debate on how different countries responded to the COVID-19 pandemic. To secure public safety, South Korea actively used personal information at the risk of personal privacy whereas France encouraged voluntary cooperation at the ...
Na Young Ahn +3 more
doaj +1 more source

