Results 111 to 120 of about 2,301,308 (387)

Security Policies Approached by Value Analysis Concepts [PDF]

open access: yes
This paper intends to redefine the role of the end users of the Internet facilities, in the process of creation of more secure transactions on the Internet, in respect of their privacy.
Florin Buhociu   +2 more
core  

Privacy-enhancing Aggregation of Internet of Things Data via Sensors Grouping

open access: yes, 2018
Big data collection practices using Internet of Things (IoT) pervasive technologies are often privacy-intrusive and result in surveillance, profiling, and discriminatory actions over citizens that in turn undermine the participation of citizens to the ...
Arabie   +76 more
core   +1 more source

Magnetic Unclonable Functions Leveraging Remanence and Anhysteretic States

open access: yesAdvanced Functional Materials, EarlyView.
A micrometric array of magnetic pillars provides a stable and unclonable hardware for generating cryptographic keys. From a single device, the ability is demonstrated to produce a 470‐bit key while also offering a reconfigurable mode of operation.
Alessandro Magni   +6 more
wiley   +1 more source

Van Der Waals Hybrid Integration of 2D Semimetals for Broadband Photodetection

open access: yesAdvanced Materials, EarlyView.
Advanced broadband photodetector technologies are essential for military and civilian applications. 2D semimetals, with their gapless band structures, high mobility, and topological protection, offer great promise for broadband PDs. This study reviews the latest advancements in broadband PDs utilizing heterostructures that combine 2D semimetals with ...
Xue Li   +9 more
wiley   +1 more source

The Value of Online Information Privacy: An Empirical Investigation [PDF]

open access: yes
Concern over online information privacy is widespread and rising. However, prior research is silent about the value of information privacy in the presence of potential benefits from sharing personally identifiable information.
I.P.L. Png   +3 more
core   +3 more sources

Distributed Performance Measurement and Usability Assessment of the Tor Anonymization Network

open access: yesFuture Internet, 2012
While the Internet increasingly permeates everyday life of individuals around the world, it becomes crucial to prevent unauthorized collection and abuse of personalized information.
Steffen Kunz   +4 more
doaj   +1 more source

Advances in Photonic Materials and Integrated Devices for Smart and Digital Healthcare: Bridging the Gap Between Materials and Systems

open access: yesAdvanced Materials, EarlyView.
This article summarizes significant technological advancements in materials, photonic devices, and bio‐interfaced systems, which demonstrate successful applications for impacting human healthcare via improved therapies, advanced diagnostics, and on‐skin health monitoring.
Seunghyeb Ban   +5 more
wiley   +1 more source

Recent Advances in Heterogeneous Frustrated Lewis Pair: Synthesis, Characterization, and Catalysis

open access: yesAdvanced Materials, EarlyView.
This review provides a concise analysis of heterogeneous frustrated Lewis pair (FLP) chemistry, focusing on their synthesis, characterization, and application in small‐molecule activation. It highlights current challenges in developing solid FLP systems and explores promising advancements through emerging technologies, offering critical insights into ...
Jiasi Li   +2 more
wiley   +1 more source

The Anonymous Poster: How to Protect Internet Users’ Privacy and Prevent Abuse [PDF]

open access: yes, 2010
The threat of anonymous Internet posting to individual privacy has been met with congressional and judicial indecisiveness. Part of the problem stems from the inherent conflict between punishing those who disrespect one\u27s privacy by placing a burden ...
Ness, Scott
core   +1 more source

Unperceivable Designs of Wearable Electronics

open access: yesAdvanced Materials, EarlyView.
Unperceivable wearable technologies seamlessly integrate into everyone's daily life, for healthcare and Internet‐of‐Things applications. By remaining completely unnoticed both visually and tactilely, by the user and others, they ensure medical privacy and allow natural social interactions.
Yijun Liu   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy