Results 31 to 40 of about 11,028,780 (364)

Delivering Smart Governance in a Future City: The Case of Glasgow

open access: yesMedia and Communication, 2018
In 2013, Glasgow City Council received significant funding to develop innovative smart city applications, including the delivery of new electronic public services and the co-production of governance.
Charles Leleux, C. William R. Webster
doaj   +1 more source

Problem of Personal Data Security and the Phenomenon of Post-Privacy in the Digital Society [PDF]

open access: yesГуманитарный вектор, 2022
The purpose of the article is to conceptualize the changes that are taking place in the perception of information privacy in today’s digital society. The relevance of the work is due to the development of modern information and communication technologies,
Lesya V. Chesnokova
doaj   +1 more source

Quantum Differential Privacy: An Information Theory Perspective [PDF]

open access: yesIEEE Transactions on Information Theory, 2022
Differential privacy has been an exceptionally successful concept when it comes to providing provable security guarantees for classical computations. More recently, the concept was generalized to quantum computations.
Christoph Hirche   +2 more
semanticscholar   +1 more source

Single Trace Side Channel Analysis on NTRU Implementation

open access: yesApplied Sciences, 2018
As researches on the quantum computer have progressed immensely, interests in post-quantum cryptography have greatly increased. NTRU is one of the well-known algorithms due to its practical key sizes and fast performance along with the resistance against
Soojung An   +4 more
doaj   +1 more source

A Multi-Component Analysis of CPTED in the Cyberspace Domain

open access: yesSensors, 2020
The visual fidelity of a virtual environment lacks the exceedingly complex layers from the physical world, but the continuous improvements of image rendering technology and computation powers have led to greater demands for virtual simulations. Our study
Jemin Justin Lee   +7 more
doaj   +1 more source

Privacy constrained information processing [PDF]

open access: yes2015 54th IEEE Conference on Decision and Control (CDC), 2015
will appear in CDC ...
Tamer Basar   +2 more
openaire   +2 more sources

Single trace side-channel attack on key reconciliation in quantum key distribution system and its efficient countermeasures

open access: yesICT Express, 2021
Although quantum mechanics guarantees the security of the quantum key distribution system, it is crucial to examine whether the implementation flaws can lead to the disclosure of sensitive information. In this paper, we propose the side-channel attack on
Dongjun Park   +5 more
doaj  

Forensic Issues and Techniques to Improve Security in SSD With Flex Capacity Feature

open access: yesIEEE Access, 2021
Over-provisioning technology is typically introduced as a means to improve the performance of storage systems, such as databases. The over-provisioning area is both hidden and difficult for normal users to access.
Na Young Ahn, Dong Hoon Lee
doaj   +1 more source

A Combined Single Trace Attack on Global Shuffling Long Integer Multiplication and its Novel Countermeasure

open access: yesIEEE Access, 2020
Advanced collision-based single trace attacks which can be applied on simple power analysis resistant scalar multiplications become virtual threat on elliptic curve cryptosystems recently as their practical experimental results are increasingly reported ...
Sangyub Lee   +3 more
doaj   +1 more source

Anonymous subject identification and privacy information management in video surveillance [PDF]

open access: yes, 2017
The widespread deployment of surveillance cameras has raised serious privacy concerns, and many privacy-enhancing schemes have been recently proposed to automatically redact images of selected individuals in the surveillance video for protection.
Barni, Mauro   +4 more
core   +1 more source

Home - About - Disclaimer - Privacy