Results 31 to 40 of about 11,267,119 (387)

Rentable CDN Using Blockchain and Proof of Provenance

open access: yesApplied Sciences, 2020
Building a rentable content delivery network (CDN), a p2p based CDN that supports content control and is composed of hardware rented from consumers, requires significant trust between the renters and consumers.
Suah Kim   +2 more
doaj   +1 more source

A blockchain-based privacy-preserving transaction scheme with public verification and reliable audit

open access: yesElectronic Research Archive, 2023
With the continuous development of Internet of Things, finance, big data and many other fields, blockchain has been widely used in these areas for transactions, data sharing, product traceability and so on. Numerous assets have appeared in the blockchain,
Shuang Yao , Dawei Zhang
doaj   +1 more source

Fast Implementation of NIST P-256 Elliptic Curve Cryptography on 8-Bit AVR Processor

open access: yesApplied Sciences, 2020
In this paper, we present a highly optimized implementation of elliptic curve cryptography (ECC) over NIST P-256 curve for an 8-bit AVR microcontroller. For improving the performance of ECC implementation, we focus on optimizing field arithmetics.
Dong-won Park   +3 more
doaj   +1 more source

Problem of Personal Data Security and the Phenomenon of Post-Privacy in the Digital Society [PDF]

open access: yesГуманитарный вектор, 2022
The purpose of the article is to conceptualize the changes that are taking place in the perception of information privacy in today’s digital society. The relevance of the work is due to the development of modern information and communication technologies,
Lesya V. Chesnokova
doaj   +1 more source

Power-Balancing Software Implementation to Mitigate Side-Channel Attacks without Using Look-Up Tables

open access: yesApplied Sciences, 2020
With the increasing number of side-channel attacks, countermeasure designers continue to develop various implementations to address such threats. Power-balancing (PB) methods hold the number of 1s and/or transitions (i.e., Hamming weight/distance) of ...
HanBit Kim, HeeSeok Kim, Seokhie Hong
doaj   +1 more source

An Informational Theory of Privacy

open access: yesSSRN Electronic Journal, 2016
Abstract Privacy of consumers or citizens is often seen as an inefficient information asymmetry. We challenge this view by showing that privacy can increase welfare in an informational sense. It can also improve information aggregation and prevent inefficient statistical discrimination.
Schottmuller, C., Jann, Ole
openaire   +1 more source

The Effect of Consumers’ Perceived Power and Risk in Digital Information Privacy: The Example of Cookie Notices

open access: yesJournal of Public Policy & Marketing JPP&M, 2020
Recent regulation in the European Union (i.e., the General Data Protection Regulation) affects websites’ information privacy practices. This regulation addresses two dimensions: websites must (1) provide visible notice regarding private information they ...
Rico Bornschein   +2 more
semanticscholar   +1 more source

Delivering Smart Governance in a Future City: The Case of Glasgow

open access: yesMedia and Communication, 2018
In 2013, Glasgow City Council received significant funding to develop innovative smart city applications, including the delivery of new electronic public services and the co-production of governance.
Charles Leleux, C. William R. Webster
doaj   +1 more source

Bounded-Leakage Differential Privacy [PDF]

open access: yes, 2020
We introduce and study a relaxation of differential privacy [Dwork et al., 2006] that accounts for mechanisms that leak some additional, bounded information about the database.
Ligett, Katrina   +2 more
core   +1 more source

A Multi-Component Analysis of CPTED in the Cyberspace Domain

open access: yesSensors, 2020
The visual fidelity of a virtual environment lacks the exceedingly complex layers from the physical world, but the continuous improvements of image rendering technology and computation powers have led to greater demands for virtual simulations. Our study
Jemin Justin Lee   +7 more
doaj   +1 more source

Home - About - Disclaimer - Privacy