Results 61 to 70 of about 2,301,308 (387)
Piracy Deserves No Privacy [PDF]
The Recording Industry Association of America ( RIAA ), the music industry\u27s trade and lobbying group, recently initiated a controversial tactic to bring to surface previously anonymous digital pirates of the Internet.
Chao, Frank
core +1 more source
In Things We Trust? Towards trustability in the Internet of Things
This essay discusses the main privacy, security and trustability issues with the Internet of ...
A. Bandura +9 more
core +1 more source
User-centric Privacy Engineering for the Internet of Things [PDF]
User privacy concerns are widely regarded as a key obstacle to the success of modern smart cyber-physical systems. In this paper, we analyse, through an example, some of the requirements that future data collection architectures of these systems should ...
Barhamgi, Mahmoud +3 more
core +3 more sources
ABSTRACT Objective Epilepsy is increasingly associated with immune dysregulation and inflammation. The T cell receptor (TCR), a key mediator of adaptive immunity, shows repertoire alterations in various immune‐mediated diseases. The unique TCR sequence serves as a molecular barcode for T cells, and clonal expansion accompanied by reduced overall TCR ...
Yong‐Won Shin +12 more
wiley +1 more source
Economic location-based services, privacy and the relationship to identity [PDF]
Mobile telephony and mobile internet are driving a new application paradigm: location-based services (LBS). Based on a person’s location and context, personalized applications can be deployed.
Fritsch, Lothar
core
ABSTRACT Background There is growing recognition of the potential of plasma proteomics for Alzheimer's Disease (AD) risk assessment and disease characterization. However, differences between proteomics platforms introduce uncertainties regarding cross‐platform applicability.
Manyue Hu +9 more
wiley +1 more source
IOT security privacy protection mechanism and mechanical structure design simulation optimization
Once the Internet of Things was proposed, it has received great attention from all walks of life and has become one of the top ten technologies that change the world.
Caiping Guo, Daqing Li
doaj +1 more source
Privacy-Enhancing Technologies for the Internet [PDF]
The increased use of the Internet for everyday activities is bringing new threats to personal privacy. The paper gives an overview of existing and potential privacy enhancing technologies for the Internet, as well as motivation and challenges for future work in this field.
David Wagner, Ian Goldberg, Eric Brewer
openaire +2 more sources
Portable Tor Router: Easily Enabling Web Privacy for Consumers
On-line privacy is of major public concern. Unfortunately, for the average consumer, there is no simple mechanism to browse the Internet privately on multiple devices. Most available Internet privacy mechanisms are either expensive, not readily available,
Barberis, Adrian +3 more
core +1 more source
Objective Social determinants of health (SDoH) can impact outcomes but are not routinely screened for in US outpatient rheumatology clinics. This study determined the feasibility of routine point‐of‐care SDoH screening among patients with systemic lupus erythematosus (SLE) and associated barriers and facilitators at the physician, care team, and ...
S. Sam Lim +11 more
wiley +1 more source

