Results 51 to 60 of about 11,267,119 (387)

Balancing Personal Privacy and Public Safety During COVID-19: The Case of South Korea

open access: yesIEEE Access, 2020
There has been vigorous debate on how different countries responded to the COVID-19 pandemic. To secure public safety, South Korea actively used personal information at the risk of personal privacy whereas France encouraged voluntary cooperation at the ...
Na Young Ahn   +3 more
doaj   +1 more source

An information-theoretic approach to privacy [PDF]

open access: yes2010 48th Annual Allerton Conference on Communication, Control, and Computing (Allerton), 2010
Ensuring the usefulness of electronic data sources while providing necessary privacy guarantees is an important unsolved problem. This problem drives the need for an overarching analytical framework that can quantify the safety of personally identifiable information (privacy) while still providing a quantifable benefit (utility) to multiple legitimate ...
Sankar, Lalitha   +2 more
openaire   +2 more sources

Classification of 4-bit S-Boxes for BOGI Permutation

open access: yesIEEE Access, 2020
Bad Output must go to Good Input (BOGI) is the primary design strategy of GIFT, a lightweight block cipher that was presented at CHES 2017. Because this strategy obviates the need to adhere to the required conditions of S-boxes when adopting bit ...
Seonggyeom Kim   +3 more
doaj   +1 more source

Trust and privacy in distributed work groups [PDF]

open access: yes, 2009
Proceedings of the 2nd International Workshop on Social Computing, Behavioral Modeling and PredictionTrust plays an important role in both group cooperation and economic exchange.
C Shapiro   +15 more
core   +1 more source

Cybersecurity and Privacy Risk Assessment of Point-of-Care Systems in Healthcare—A Use Case Approach

open access: yesApplied Sciences, 2021
Point-of-care systems are generally used in healthcare to respond rapidly and prevent critical health conditions. Hence, POC systems often handle personal health information; and consequently, their cybersecurity and privacy requirements are of crucial ...
Marc Jofre   +6 more
doaj   +1 more source

Highly Efficient SCA-Resistant Binary Field Multiplication on 8-Bit AVR Microcontrollers

open access: yesApplied Sciences, 2020
Binary field ( B F ) multiplication is a basic and important operation for widely used crypto algorithms such as the GHASH function of GCM (Galois/Counter Mode) mode and NIST-compliant binary Elliptic Curve Cryptosystems (ECCs). Recently, Seo et al.
Seog Chung Seo, Donggeun Kwon
doaj   +1 more source

Privacy and artificial intelligence: challenges for protecting health information in a new era

open access: yesBMC Medical Ethics, 2021
Advances in healthcare artificial intelligence (AI) are occurring rapidly and there is a growing discussion about managing its development. Many AI technologies end up owned and controlled by private entities. The nature of the implementation of AI could
Blake Murdoch
semanticscholar   +1 more source

On-line privacy behavior: using user interfaces for salient factors [PDF]

open access: yes, 2014
The problem of privacy in social networks is well documented within literature; users have privacy concerns however, they consistently disclose their sensitive information and leave it open to unintended third parties.
Hughes-Roberts, T, Kani-Zabihi, E
core   +2 more sources

Lightweight Conversion from Arithmetic to Boolean Masking for Embedded IoT Processor

open access: yesApplied Sciences, 2019
A masking method is a widely known countermeasure against side-channel attacks. To apply a masking method to cryptosystems consisting of Boolean and arithmetic operations, such as ARX (Addition, Rotation, XOR) block ciphers, a masking conversion ...
HanBit Kim, Seokhie Hong, HeeSeok Kim
doaj   +1 more source

On the relation between Differential Privacy and Quantitative Information Flow [PDF]

open access: yes, 2011
Differential privacy is a notion that has emerged in the community of statistical databases, as a response to the problem of protecting the privacy of the database's participants when performing statistical queries.
A. Ghosh   +13 more
core   +7 more sources

Home - About - Disclaimer - Privacy