Results 31 to 40 of about 283,565 (299)

Design of a new type of safety protection device for gas bottle cabinet [PDF]

open access: yesMATEC Web of Conferences, 2020
Aiming at the problem of explosion caused by leakage of flammable and explosive gas cylinder, a new type of safety protection device for gas bottle cabinet is designed to solve this problem.
Guo Lianghui, Jia Wenting
doaj   +1 more source

The Wave of the Digital Economy: The Conflict and Balance between Data Sharing and Personal Privacy [PDF]

open access: yesSHS Web of Conferences, 2022
As modern society gradually penetrates into the era of big data, digital economy becomes an important field. Citizens’ information data is rapidly passed in the tripartite field of economy, government and individuals, and citizens’ privacy leakage is ...
Lin Xiwen   +4 more
doaj   +1 more source

Monolayer protection for eletrochemical migration control in silver nanocomposite [PDF]

open access: yes, 2006
©2006 American Institute of Physics. The electronic version of this article is the complete one and can be found online at: http://link.aip.org/link/?APPLAB/89/112112/1DOI:10.1063/1.2353813The authors introduced an effective approach of using monolayer ...
Li, Yi, Wong, C. P.
core   +1 more source

Protecting Cryptographic Keys against Continual Leakage [PDF]

open access: yes, 2010
Side-channel attacks have often proven to have a devastating effect on the security of cryptographic schemes. In this paper, we address the problem of storing cryptographic keys and computing on them in a manner that preserves security even when the adversary is able to obtain information leakage during the computation on the key.
Ali Juma, Yevgeniy Vahlis
openaire   +1 more source

Ozone: Efficient Execution with Zero Timing Leakage for Modern Microarchitectures

open access: yes, 2017
Time variation during program execution can leak sensitive information. Time variations due to program control flow and hardware resource contention have been used to steal encryption keys in cipher implementations such as AES and RSA.
Austin, Todd, Aweke, Zelalem Birhanu
core   +1 more source

On the relation between Differential Privacy and Quantitative Information Flow [PDF]

open access: yes, 2011
Differential privacy is a notion that has emerged in the community of statistical databases, as a response to the problem of protecting the privacy of the database's participants when performing statistical queries.
A. Ghosh   +13 more
core   +7 more sources

Rule Fusion of Privacy Protection Strategies for Co-Ownership Data Sharing

open access: yesMathematics, 2022
With the rapid development of social networks, personal privacy leakage has become more and more serious. A social network is a shared platform. Resources in a social network may be shared by multiple owners.
Tinghuai Ma   +4 more
doaj   +1 more source

Universal Leakage Elimination

open access: yes, 2004
``Leakage'' errors are particularly serious errors which couple states within a code subspace to states outside of that subspace thus destroying the error protection benefit afforded by an encoded state.
A. Bohm   +12 more
core   +1 more source

Expert-based development of a standard in CO2 sequestration monitoring technology [PDF]

open access: yes, 2014
Bureau of Economic ...
Hovorka, S. D.   +6 more
core   +1 more source

Gut microbiome and aging—A dynamic interplay of microbes, metabolites, and the immune system

open access: yesFEBS Letters, EarlyView.
Age‐dependent shifts in microbial communities engender shifts in microbial metabolite profiles. These in turn drive shifts in barrier surface permeability of the gut and brain and induce immune activation. When paired with preexisting age‐related chronic inflammation this increases the risk of neuroinflammation and neurodegenerative diseases.
Aaron Mehl, Eran Blacher
wiley   +1 more source

Home - About - Disclaimer - Privacy