Results 61 to 70 of about 11,267,119 (387)
In recent years, it has become easy to obtain location information quite precisely. However, the acquisition of such information has risks such as individual identification and leakage of sensitive information, so it is necessary to protect the privacy ...
A Wasef +8 more
core +1 more source
Security and privacy in the information economy [PDF]
In this session, we approach the question of “security and privacy in the information economy” as computer science researchers. There are two major components to the computer science research point of view: namely that of the theorist, whose goal is to develop a rigorous mathematical theory of security and privacy, and that of the practitioner, whose ...
J, Feigenbaum +3 more
openaire +2 more sources
Gamification vs. Privacy: Identifying and Analysing the Major Concerns
Gamification, the use of game design elements in applications that are not games, has been developed to provide attractive environments and maintain user interest in several domains.
Aikaterini-Georgia Mavroeidi +3 more
doaj +1 more source
Context-aware Data Aggregation with Localized Information Privacy [PDF]
In this paper, localized information privacy (LIP) is proposed, as a new privacy definition, which allows statistical aggregation while protecting users’ privacy without relying on a trusted third party. The notion of context-awareness is incorporated in
Bo Jiang, Ming Li, R. Tandon
semanticscholar +1 more source
Differential Privacy: on the trade-off between Utility and Information Leakage [PDF]
Differential privacy is a notion of privacy that has become very popular in the database community. Roughly, the idea is that a randomized query mechanism provides sufficient privacy protection if the ratio between the probabilities that two adjacent ...
Alvim, Mário S. +4 more
core +6 more sources
Decentralized Detection With Robust Information Privacy Protection [PDF]
We consider a decentralized detection network whose aim is to infer a public hypothesis of interest. However, the raw sensor observations also allow the fusion center to infer private hypotheses that we wish to protect.
Meng Sun, Wee Peng Tay
semanticscholar +1 more source
Why emerging leaders should focus on being good postdoctoral supervisors
Swamped with work and suddenly a new student is waiting at your doorstep for supervision? Great—this is your chance! In this article, we share tips on how postdocs can strengthen their leadership skills while supervising students. This image has been created using DALL·E. Many postdocs work as leaders later in their career.
Hannah Rostalski +5 more
wiley +1 more source
Many attempts to define privacy have been made over the last century. Early definitions and theories of privacy had little to do with the concept of information and, when they did, only in an informal sense. With the advent of information technology, the
Gryz, Jarek
core
Bridging the gap: Multi‐stakeholder perspectives of molecular diagnostics in oncology
Although molecular diagnostics is transforming cancer care, implementing novel technologies remains challenging. This study identifies unmet needs and technology requirements through a two‐step stakeholder involvement. Liquid biopsies for monitoring applications and predictive biomarker testing emerge as key unmet needs. Technology requirements vary by
Jorine Arnouts +8 more
wiley +1 more source
An enhanced DPoS consensus mechanism using quadratic voting in Web 3.0 ecosystem [PDF]
Consensus mechanisms are fundamental to maintaining consistency in distributed systems. With the advent of Web 3.0, blockchain has revealed limitations of traditional Delegated Proof of Stake (DPoS) consensus mechanisms.
Tianyu Lei +8 more
doaj +1 more source

