Results 41 to 50 of about 2,332,315 (339)

Hard to See, Harder to Block: Exploring the Challenges in Email Tracking Pixels Detection

open access: yesIEEE Access
Email tracking pixels are a well-known mechanism for monitoring user interactions, yet reliably detecting and blocking them remains challenging in practice.
Federico Cernera   +7 more
doaj   +1 more source

A privacy protection mechanism for numerical control information in Internet of things

open access: yesInternational Journal of Distributed Sensor Networks, 2017
The application of numerical control machine tool in the Internet of things has attracted large number of attention. It is a complex network system that integrates sensor network, Internet, and mobile communication network.
Yunfa Li, Mingyi Li
doaj   +1 more source

A Developer-Friendly Library for Smart Home IoT Privacy-Preserving Traffic Obfuscation

open access: yes, 2018
The number and variety of Internet-connected devices have grown enormously in the past few years, presenting new challenges to security and privacy. Research has shown that network adversaries can use traffic rate metadata from consumer IoT devices to ...
Apthorpe, Noah   +2 more
core   +1 more source

Systemic T Cell Receptor Profiling Reveals Adaptive Immune Activation and Potential Immune Signatures of Diagnosis and Brain Atrophy in Epilepsy

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective Epilepsy is increasingly associated with immune dysregulation and inflammation. The T cell receptor (TCR), a key mediator of adaptive immunity, shows repertoire alterations in various immune‐mediated diseases. The unique TCR sequence serves as a molecular barcode for T cells, and clonal expansion accompanied by reduced overall TCR ...
Yong‐Won Shin   +12 more
wiley   +1 more source

Emotional responses and behavioral coping mechanism to sufferers′ privacy leakage among Chinese internet users during public health emergencies

open access: yesZhongguo gonggong weisheng, 2022
ObjectiveTo study emotional reactions to and behavior intentions about sufferers′ privacy leakage among internet users in China during public health emergencies (PHE) and to provide references for improving government supervision capability and risk ...
Zhi-xin LIU, Jun-ping LIU, Ming-lei SUN
doaj   +1 more source

Piracy Deserves No Privacy [PDF]

open access: yes, 2003
The Recording Industry Association of America ( RIAA ), the music industry\u27s trade and lobbying group, recently initiated a controversial tactic to bring to surface previously anonymous digital pirates of the Internet.
Chao, Frank
core   +1 more source

In Things We Trust? Towards trustability in the Internet of Things

open access: yes, 2011
This essay discusses the main privacy, security and trustability issues with the Internet of ...
A. Bandura   +9 more
core   +1 more source

Plasma Proteomic Signatures for Alzheimer's Disease: Comparable Accuracy to ATN Biomarkers and Cross‐Platform Validation

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Background There is growing recognition of the potential of plasma proteomics for Alzheimer's Disease (AD) risk assessment and disease characterization. However, differences between proteomics platforms introduce uncertainties regarding cross‐platform applicability.
Manyue Hu   +9 more
wiley   +1 more source

Privacy protection scheme for internet of vehicles based on homomorphic encryption and block chain technology

open access: yes网络与信息安全学报, 2020
In order to solve the problem that the security of traditional internet of vehicles devices is relatively low,which may threaten the privacy of users,a privacy protection scheme based on homomorphic encryption and block chain technology was proposed.This
Ruijin WANG   +3 more
doaj   +3 more sources

Portable Tor Router: Easily Enabling Web Privacy for Consumers

open access: yes, 2017
On-line privacy is of major public concern. Unfortunately, for the average consumer, there is no simple mechanism to browse the Internet privately on multiple devices. Most available Internet privacy mechanisms are either expensive, not readily available,
Barberis, Adrian   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy