Results 51 to 60 of about 11,259,019 (289)

A preimage attack on reduced GIMLI‐HASH with unbalanced squeezing phase

open access: yesIET Information Security, 2023
In Conference on Cryptographic Hardware and Embedded System 2017, Bernstein et al. proposed GIMLI, a 384‐bit permutation with 24 rounds, which aims to provide high performance on various platforms.
Yongseong Lee   +3 more
doaj   +1 more source

Differential Privacy: on the trade-off between Utility and Information Leakage [PDF]

open access: yes, 2011
Differential privacy is a notion of privacy that has become very popular in the database community. Roughly, the idea is that a randomized query mechanism provides sufficient privacy protection if the ratio between the probabilities that two adjacent ...
Alvim, Mário S.   +4 more
core   +6 more sources

Cybersecurity and Privacy Risk Assessment of Point-of-Care Systems in Healthcare—A Use Case Approach

open access: yesApplied Sciences, 2021
Point-of-care systems are generally used in healthcare to respond rapidly and prevent critical health conditions. Hence, POC systems often handle personal health information; and consequently, their cybersecurity and privacy requirements are of crucial ...
Marc Jofre   +6 more
doaj   +1 more source

Differential Privacy as a Mutual Information Constraint [PDF]

open access: yes, 2016
Differential privacy is a precise mathematical constraint meant to ensure privacy of individual pieces of information in a database even while queries are being answered about the aggregate. Intuitively, one must come to terms with what differential privacy does and does not guarantee.
arxiv   +1 more source

Position Paper on Simulating Privacy Dynamics in Recommender Systems [PDF]

open access: yesarXiv, 2021
In this position paper, we discuss the merits of simulating privacy dynamics in recommender systems. We study this issue at hand from two perspectives: Firstly, we present a conceptual approach to integrate privacy into recommender system simulations, whose key elements are privacy agents. These agents can enhance users' profiles with different privacy
arxiv  

When and where do you want to hide? Recommendation of location privacy preferences with local differential privacy

open access: yes, 2019
In recent years, it has become easy to obtain location information quite precisely. However, the acquisition of such information has risks such as individual identification and leakage of sensitive information, so it is necessary to protect the privacy ...
A Wasef   +8 more
core   +1 more source

Bounded-Leakage Differential Privacy [PDF]

open access: yes, 2020
We introduce and study a relaxation of differential privacy [Dwork et al., 2006] that accounts for mechanisms that leak some additional, bounded information about the database.
Ligett, Katrina   +2 more
core   +1 more source

Lightweight Conversion from Arithmetic to Boolean Masking for Embedded IoT Processor

open access: yesApplied Sciences, 2019
A masking method is a widely known countermeasure against side-channel attacks. To apply a masking method to cryptosystems consisting of Boolean and arithmetic operations, such as ARX (Addition, Rotation, XOR) block ciphers, a masking conversion ...
HanBit Kim, Seokhie Hong, HeeSeok Kim
doaj   +1 more source

Citizens’ Information Privacy Protection Model in e-Government for Developing Countries [PDF]

open access: yesپژوهش‌های مدیریت عمومی, 2016
The most important aim of this study is to propose a model for protecting citizens’ information privacy in e-Government for developing countries. This study develops theoretical foundations and models of e-Government in  judicial-legal dimension.
Mohammad Taghi Taghavifard   +3 more
doaj   +1 more source

Understanding How to Inform Blind and Low-Vision Users about Data Privacy through Privacy Question Answering Assistants [PDF]

open access: yesarXiv, 2023
Understanding and managing data privacy in the digital world can be challenging for sighted users, let alone blind and low-vision (BLV) users. There is limited research on how BLV users, who have special accessibility needs, navigate data privacy, and how potential privacy tools could assist them.
arxiv  

Home - About - Disclaimer - Privacy