Results 51 to 60 of about 651,726 (281)
Leveraging Secure Multiparty Computation in the Internet of Things
Centralized systems in the Internet of Things---be it local middleware or cloud-based services---fail to fundamentally address privacy of the collected data.
Carle, Georg, von Maltitz, Marcel
core +1 more source
An overview of design principles and scalable fabrication strategies for multifunctional bio‐based packaging. Radiative cooling films, modified‐atmosphere films/membranes, active antimicrobial/antioxidant platforms, intelligent optical/electrochemical labels, and superhydrophobic surfaces are co‐engineered from material chemistry to mesoscale structure
Lei Zhang +6 more
wiley +1 more source
Internet of Things: Survey on Security and Privacy
The Internet of Things (IoT) is intended for ubiquitous connectivity among different entities or "things". While its purpose is to provide effective and efficient solutions, security of the devices and network is a challenging issue.
Mendez, Diego M. +2 more
core +1 more source
This review highlights recent advances in electrospun nanofiber‐based triboelectric nanogenerators, emphasizing how material design, fiber architecture, and interface engineering collectively enhance output performance and mechanical durability. Key developments in porous, aligned, core‐shell, and hierarchical nanofibers are discussed alongside ...
MD Fajla Rabbi +3 more
wiley +1 more source
Privacy cynicism: A new approach to the privacy paradox
Privacy concerns among Internet users are consistently found to be high. At the same time, these concerns do not appear to generate a corresponding wave of privacy protection behavior.
Christian Pieter Hoffmann +2 more
doaj +1 more source
An Accuracy-Assured Privacy-Preserving Recommender System for Internet Commerce [PDF]
Recommender systems, tool for predicting users' potential preferences by computing history data and users' interests, show an increasing importance in various Internet applications such as online shopping.
Lu, Zhigang, Shen, Hong
core +2 more sources
The perspective presents an integrated view of neuromorphic technologies, from device physics to real‐time applicability, while highlighting the necessity of full‐stack co‐optimization. By outlining practical hardware‐level strategies to exploit device behavior and mitigate non‐idealities, it shows pathways for building efficient, scalable, and ...
Kapil Bhardwaj +8 more
wiley +1 more source
A Semantic Inference Based Method for Privacy Measurement
In the era of Internet and big data, an increasing number of intelligent applications have been developed. As the result, a lot of user data can be collected and stored by Internet companies as well as by ordinary users through various media platforms ...
Baocun Chen +5 more
doaj +1 more source
Transducers convert physical signals into electrical and optical representations, yet each mechanism is bounded by intrinsic trade‐offs across bandwidth, sensitivity, speed, and energy. This review maps transduction mechanisms across physical scale and frequency, showing how heterogeneous integration and multiphysics co‐design transform isolated ...
Aolei Xu +8 more
wiley +1 more source
Did the NSA and GCHQ Diminish Our Privacy? What the Control Account Should Say [PDF]
A standard account of privacy says that it is essentially a kind of control over personal information. Many privacy scholars have argued against this claim by relying on so-called threatened loss cases. In these cases, personal information about an agent
Menges, Leonhard
core

