Results 61 to 70 of about 11,267,119 (387)

When and where do you want to hide? Recommendation of location privacy preferences with local differential privacy

open access: yes, 2019
In recent years, it has become easy to obtain location information quite precisely. However, the acquisition of such information has risks such as individual identification and leakage of sensitive information, so it is necessary to protect the privacy ...
A Wasef   +8 more
core   +1 more source

Security and privacy in the information economy [PDF]

open access: yesProceedings of the National Academy of Sciences, 1997
In this session, we approach the question of “security and privacy in the information economy” as computer science researchers. There are two major components to the computer science research point of view: namely that of the theorist, whose goal is to develop a rigorous mathematical theory of security and privacy, and that of the practitioner, whose ...
J, Feigenbaum   +3 more
openaire   +2 more sources

Gamification vs. Privacy: Identifying and Analysing the Major Concerns

open access: yesFuture Internet, 2019
Gamification, the use of game design elements in applications that are not games, has been developed to provide attractive environments and maintain user interest in several domains.
Aikaterini-Georgia Mavroeidi   +3 more
doaj   +1 more source

Context-aware Data Aggregation with Localized Information Privacy [PDF]

open access: yesIEEE Conference on Communications and Network Security, 2018
In this paper, localized information privacy (LIP) is proposed, as a new privacy definition, which allows statistical aggregation while protecting users’ privacy without relying on a trusted third party. The notion of context-awareness is incorporated in
Bo Jiang, Ming Li, R. Tandon
semanticscholar   +1 more source

Differential Privacy: on the trade-off between Utility and Information Leakage [PDF]

open access: yes, 2011
Differential privacy is a notion of privacy that has become very popular in the database community. Roughly, the idea is that a randomized query mechanism provides sufficient privacy protection if the ratio between the probabilities that two adjacent ...
Alvim, Mário S.   +4 more
core   +6 more sources

Decentralized Detection With Robust Information Privacy Protection [PDF]

open access: yesIEEE Transactions on Information Forensics and Security, 2018
We consider a decentralized detection network whose aim is to infer a public hypothesis of interest. However, the raw sensor observations also allow the fusion center to infer private hypotheses that we wish to protect.
Meng Sun, Wee Peng Tay
semanticscholar   +1 more source

Why emerging leaders should focus on being good postdoctoral supervisors

open access: yesFEBS Letters, EarlyView.
Swamped with work and suddenly a new student is waiting at your doorstep for supervision? Great—this is your chance! In this article, we share tips on how postdocs can strengthen their leadership skills while supervising students. This image has been created using DALL·E. Many postdocs work as leaders later in their career.
Hannah Rostalski   +5 more
wiley   +1 more source

Privacy as an Asset [PDF]

open access: yes, 2017
Many attempts to define privacy have been made over the last century. Early definitions and theories of privacy had little to do with the concept of information and, when they did, only in an informal sense. With the advent of information technology, the
Gryz, Jarek
core  

Bridging the gap: Multi‐stakeholder perspectives of molecular diagnostics in oncology

open access: yesMolecular Oncology, EarlyView.
Although molecular diagnostics is transforming cancer care, implementing novel technologies remains challenging. This study identifies unmet needs and technology requirements through a two‐step stakeholder involvement. Liquid biopsies for monitoring applications and predictive biomarker testing emerge as key unmet needs. Technology requirements vary by
Jorine Arnouts   +8 more
wiley   +1 more source

An enhanced DPoS consensus mechanism using quadratic voting in Web 3.0 ecosystem [PDF]

open access: yesBlockchain
Consensus mechanisms are fundamental to maintaining consistency in distributed systems. With the advent of Web 3.0, blockchain has revealed limitations of traditional Delegated Proof of Stake (DPoS) consensus mechanisms.
Tianyu Lei   +8 more
doaj   +1 more source

Home - About - Disclaimer - Privacy