Results 61 to 70 of about 11,259,019 (289)

Information Extraction Under Privacy Constraints

open access: yes, 2016
A privacy-constrained information extraction problem is considered where for a pair of correlated discrete random variables $(X,Y)$ governed by a given joint distribution, an agent observes $Y$ and wants to convey to a potentially public user as much ...
Alajaji, Fady   +3 more
core   +2 more sources

Privacy Implications of In-Network Aggregation Mechanisms for VANETs [PDF]

open access: yes, 2011
Research on vehicular ad hoc networks (VANETs) is active and ongoing. Proposed applications range from safety applications, and traffic efficiency applications to entertainment applications. Common to many applications is the need to disseminate possibly
Dietzel, Stefan
core   +4 more sources

Highly Efficient SCA-Resistant Binary Field Multiplication on 8-Bit AVR Microcontrollers

open access: yesApplied Sciences, 2020
Binary field ( B F ) multiplication is a basic and important operation for widely used crypto algorithms such as the GHASH function of GCM (Galois/Counter Mode) mode and NIST-compliant binary Elliptic Curve Cryptosystems (ECCs). Recently, Seo et al.
Seog Chung Seo, Donggeun Kwon
doaj   +1 more source

Technical Privacy Metrics: a Systematic Survey [PDF]

open access: yesIsabel Wagner and David Eckhoff. 2018. Technical Privacy Metrics: a Systematic Survey. ACM Comput. Surv. 51, 3, Article 57 (June 2018), 2015
The goal of privacy metrics is to measure the degree of privacy enjoyed by users in a system and the amount of protection offered by privacy-enhancing technologies. In this way, privacy metrics contribute to improving user privacy in the digital world. The diversity and complexity of privacy metrics in the literature makes an informed choice of metrics
arxiv   +1 more source

Reconstruction Attacks on Aggressive Relaxations of Differential Privacy [PDF]

open access: yesarXiv, 2022
Differential privacy is a widely accepted formal privacy definition that allows aggregate information about a dataset to be released while controlling privacy leakage for individuals whose records appear in the data. Due to the unavoidable tension between privacy and utility, there have been many works trying to relax the requirements of differential ...
arxiv  

Protecting Information Privacy [PDF]

open access: yes, 2011
This report for the Equality and Human Rights Commission (the Commission) examines the threats to information privacy that have emerged in recent years, focusing on the activities of the state.
Goold, Benjamin, Raab, Charles
core   +1 more source

Hypothesis Testing Under Mutual Information Privacy Constraints in the High Privacy Regime [PDF]

open access: yesIEEE Transactions on Information Forensics and Security, 2017
Hypothesis testing is a statistical inference framework for determining the true distribution among a set of possible distributions for a given data set. Privacy restrictions may require the curator of the data or the respondents themselves to share data
Jiachun Liao   +3 more
semanticscholar   +1 more source

Hiding Contextual Information for Defending a Global Attacker

open access: yesIEEE Access, 2018
As wireless sensor networks are mostly deployed in harsh and hostile environments, lack of human maintenance, it has become a severe challenge to offer security or privacy service, especially when facing a powerful attacker.
Qian Zhou, Xiaolin Qin, Xiaojun Xie
doaj   +1 more source

Unilateral Invasions of Privacy [PDF]

open access: yes, 2016
Most people seem to agree that individuals have too little privacy, and most proposals to address that problem focus on ways to give those users more information about, and more control over, how information about them is used.
Ford, Roger Allan
core   +2 more sources

Trust and privacy in distributed work groups [PDF]

open access: yes, 2009
Proceedings of the 2nd International Workshop on Social Computing, Behavioral Modeling and PredictionTrust plays an important role in both group cooperation and economic exchange.
C Shapiro   +15 more
core   +1 more source

Home - About - Disclaimer - Privacy