Results 61 to 70 of about 11,259,019 (289)
Information Extraction Under Privacy Constraints
A privacy-constrained information extraction problem is considered where for a pair of correlated discrete random variables $(X,Y)$ governed by a given joint distribution, an agent observes $Y$ and wants to convey to a potentially public user as much ...
Alajaji, Fady+3 more
core +2 more sources
Privacy Implications of In-Network Aggregation Mechanisms for VANETs [PDF]
Research on vehicular ad hoc networks (VANETs) is active and ongoing. Proposed applications range from safety applications, and traffic efficiency applications to entertainment applications. Common to many applications is the need to disseminate possibly
Dietzel, Stefan
core +4 more sources
Highly Efficient SCA-Resistant Binary Field Multiplication on 8-Bit AVR Microcontrollers
Binary field ( B F ) multiplication is a basic and important operation for widely used crypto algorithms such as the GHASH function of GCM (Galois/Counter Mode) mode and NIST-compliant binary Elliptic Curve Cryptosystems (ECCs). Recently, Seo et al.
Seog Chung Seo, Donggeun Kwon
doaj +1 more source
Technical Privacy Metrics: a Systematic Survey [PDF]
The goal of privacy metrics is to measure the degree of privacy enjoyed by users in a system and the amount of protection offered by privacy-enhancing technologies. In this way, privacy metrics contribute to improving user privacy in the digital world. The diversity and complexity of privacy metrics in the literature makes an informed choice of metrics
arxiv +1 more source
Reconstruction Attacks on Aggressive Relaxations of Differential Privacy [PDF]
Differential privacy is a widely accepted formal privacy definition that allows aggregate information about a dataset to be released while controlling privacy leakage for individuals whose records appear in the data. Due to the unavoidable tension between privacy and utility, there have been many works trying to relax the requirements of differential ...
arxiv
Protecting Information Privacy [PDF]
This report for the Equality and Human Rights Commission (the Commission) examines the threats to information privacy that have emerged in recent years, focusing on the activities of the state.
Goold, Benjamin, Raab, Charles
core +1 more source
Hypothesis Testing Under Mutual Information Privacy Constraints in the High Privacy Regime [PDF]
Hypothesis testing is a statistical inference framework for determining the true distribution among a set of possible distributions for a given data set. Privacy restrictions may require the curator of the data or the respondents themselves to share data
Jiachun Liao+3 more
semanticscholar +1 more source
Hiding Contextual Information for Defending a Global Attacker
As wireless sensor networks are mostly deployed in harsh and hostile environments, lack of human maintenance, it has become a severe challenge to offer security or privacy service, especially when facing a powerful attacker.
Qian Zhou, Xiaolin Qin, Xiaojun Xie
doaj +1 more source
Unilateral Invasions of Privacy [PDF]
Most people seem to agree that individuals have too little privacy, and most proposals to address that problem focus on ways to give those users more information about, and more control over, how information about them is used.
Ford, Roger Allan
core +2 more sources
Trust and privacy in distributed work groups [PDF]
Proceedings of the 2nd International Workshop on Social Computing, Behavioral Modeling and PredictionTrust plays an important role in both group cooperation and economic exchange.
C Shapiro+15 more
core +1 more source