Results 41 to 50 of about 11,259,019 (289)

Anonymous subject identification and privacy information management in video surveillance [PDF]

open access: yes, 2017
The widespread deployment of surveillance cameras has raised serious privacy concerns, and many privacy-enhancing schemes have been recently proposed to automatically redact images of selected individuals in the surveillance video for protection.
Barni, Mauro   +4 more
core   +1 more source

A Combined Single Trace Attack on Global Shuffling Long Integer Multiplication and its Novel Countermeasure

open access: yesIEEE Access, 2020
Advanced collision-based single trace attacks which can be applied on simple power analysis resistant scalar multiplications become virtual threat on elliptic curve cryptosystems recently as their practical experimental results are increasingly reported ...
Sangyub Lee   +3 more
doaj   +1 more source

Classification of 4-bit S-Boxes for BOGI Permutation

open access: yesIEEE Access, 2020
Bad Output must go to Good Input (BOGI) is the primary design strategy of GIFT, a lightweight block cipher that was presented at CHES 2017. Because this strategy obviates the need to adhere to the required conditions of S-boxes when adopting bit ...
Seonggyeom Kim   +3 more
doaj   +1 more source

Context-aware Data Aggregation with Localized Information Privacy [PDF]

open access: yesIEEE Conference on Communications and Network Security, 2018
In this paper, localized information privacy (LIP) is proposed, as a new privacy definition, which allows statistical aggregation while protecting users’ privacy without relying on a trusted third party. The notion of context-awareness is incorporated in
Bo Jiang, Ming Li, R. Tandon
semanticscholar   +1 more source

Privacy and artificial intelligence: challenges for protecting health information in a new era

open access: yesBMC Medical Ethics, 2021
Advances in healthcare artificial intelligence (AI) are occurring rapidly and there is a growing discussion about managing its development. Many AI technologies end up owned and controlled by private entities. The nature of the implementation of AI could
Blake Murdoch
semanticscholar   +1 more source

Balancing Personal Privacy and Public Safety During COVID-19: The Case of South Korea

open access: yesIEEE Access, 2020
There has been vigorous debate on how different countries responded to the COVID-19 pandemic. To secure public safety, South Korea actively used personal information at the risk of personal privacy whereas France encouraged voluntary cooperation at the ...
Na Young Ahn   +3 more
doaj   +1 more source

Gamification vs. Privacy: Identifying and Analysing the Major Concerns

open access: yesFuture Internet, 2019
Gamification, the use of game design elements in applications that are not games, has been developed to provide attractive environments and maintain user interest in several domains.
Aikaterini-Georgia Mavroeidi   +3 more
doaj   +1 more source

Privacy-Utility Trade-Off [PDF]

open access: yesarXiv, 2022
In this paper, we investigate the privacy-utility trade-off (PUT) problem, which considers the minimal privacy loss at a fixed expense of utility. Several different kinds of privacy in the PUT problem are studied, including differential privacy, approximate differential privacy, maximal information, maximal leakage, Renyi differential privacy, Sibson ...
arxiv  

Decentralized Detection With Robust Information Privacy Protection [PDF]

open access: yesIEEE Transactions on Information Forensics and Security, 2018
We consider a decentralized detection network whose aim is to infer a public hypothesis of interest. However, the raw sensor observations also allow the fusion center to infer private hypotheses that we wish to protect.
Meng Sun, Wee Peng Tay
semanticscholar   +1 more source

Development and Analysis of Deterministic Privacy-Preserving Policies Using Non-Stochastic Information Theory [PDF]

open access: yes, 2019
A deterministic privacy metric using non-stochastic information theory is developed. Particularly, minimax information is used to construct a measure of information leakage, which is inversely proportional to the measure of privacy.
Farokhi, Farhad
core   +2 more sources

Home - About - Disclaimer - Privacy