Results 41 to 50 of about 11,267,119 (387)

An Exploratory Study on the Taiwanese Primary and Secondary School Teachers’ Understanding of Personal Data Protection Act [PDF]

open access: yesJiàoyù zīliào yǔ túshūguǎn xué, 2021
In this study, the researchers would like to explore Taiwanese primary and secondary school teachers’ understanding on the provisions of the Personal Data Protection Act (hereinafter referred to as “PDPA”).
Mei-Lien Hsueh, Chien Chou
doaj   +1 more source

Single Trace Side Channel Analysis on NTRU Implementation

open access: yesApplied Sciences, 2018
As researches on the quantum computer have progressed immensely, interests in post-quantum cryptography have greatly increased. NTRU is one of the well-known algorithms due to its practical key sizes and fast performance along with the resistance against
Soojung An   +4 more
doaj   +1 more source

Forensic Issues and Techniques to Improve Security in SSD With Flex Capacity Feature

open access: yesIEEE Access, 2021
Over-provisioning technology is typically introduced as a means to improve the performance of storage systems, such as databases. The over-provisioning area is both hidden and difficult for normal users to access.
Na Young Ahn, Dong Hoon Lee
doaj   +1 more source

Privacy and Health Information Technology [PDF]

open access: yes, 2009
The increased use of health information technology (health IT) is a common element of nearly every health reform proposal because it has the potential to decrease costs, improve health outcomes, coordinate care, and improve public health.
Deven McGraw   +3 more
core   +2 more sources

Quantum Differential Privacy: An Information Theory Perspective [PDF]

open access: yesIEEE Transactions on Information Theory, 2022
Differential privacy has been an exceptionally successful concept when it comes to providing provable security guarantees for classical computations. More recently, the concept was generalized to quantum computations.
Christoph Hirche   +2 more
semanticscholar   +1 more source

Concept, Examples and Jurisprudential and Legal Documents of Family Privacy [PDF]

open access: yesفقه و حقوق خانواده, 2022
Privacy is a set of beliefs, practices, behaviors, characteristics, and circumstances of any person that is not obvius to public and he or she is reluctant to disclose it and reacts to others' intrusion or supervision. This is one of the most fundamental
abolghasem naghibi, Masumeh shahriari
doaj   +1 more source

A Combined Single Trace Attack on Global Shuffling Long Integer Multiplication and its Novel Countermeasure

open access: yesIEEE Access, 2020
Advanced collision-based single trace attacks which can be applied on simple power analysis resistant scalar multiplications become virtual threat on elliptic curve cryptosystems recently as their practical experimental results are increasingly reported ...
Sangyub Lee   +3 more
doaj   +1 more source

Development and Analysis of Deterministic Privacy-Preserving Policies Using Non-Stochastic Information Theory [PDF]

open access: yes, 2019
A deterministic privacy metric using non-stochastic information theory is developed. Particularly, minimax information is used to construct a measure of information leakage, which is inversely proportional to the measure of privacy.
Farokhi, Farhad
core   +2 more sources

A preimage attack on reduced GIMLI‐HASH with unbalanced squeezing phase

open access: yesIET Information Security, 2023
In Conference on Cryptographic Hardware and Embedded System 2017, Bernstein et al. proposed GIMLI, a 384‐bit permutation with 24 rounds, which aims to provide high performance on various platforms.
Yongseong Lee   +3 more
doaj   +1 more source

Privacy and Integrity of Medical Information [PDF]

open access: yes, 2020
Abstract This chapter explores contemporary regulation of medical privacy in the United States and Europe and its challenges. The need for privacy is a fundamental human necessity. Privacy relates to human beings’ ability to maintain their dignity and avoid disclosure of information that might be deemed unpleasant.
Herveg, Jean, Hoffman, Sharona
openaire   +2 more sources

Home - About - Disclaimer - Privacy