Results 1 to 10 of about 2,280,353 (382)

It’s getting personal: The ethical and educational implications of personalised learning technology

open access: yesJournal of Philosophy in Schools, 2019
Personalised learning systems—systems that predict learning needs to tailor education to the unique learning needs of individual students—are gaining rapid popularity.
Iris Huis in ’t Veld   +1 more
doaj   +1 more source

When are identification protocols with sparse challenges safe? The case of the Coskun and Herley attack

open access: yesJournal of Mathematical Cryptology, 2017
Cryptographic identification protocols enable a prover to prove its identity to a verifier. A subclass of such protocols are shared-secret challenge-response identification protocols in which the prover and the verifier share the same secret and the ...
Asghar Hassan Jameel, Kaafar Mohamed Ali
doaj   +1 more source

Privacy-Preserving Image Retrieval and Sharing in Social Multimedia Applications [PDF]

open access: gold, 2020
Zongye Zhang   +4 more
openalex   +1 more source

Short Privacy-Preserving Proofs of Liabilities [PDF]

open access: gold, 2023
Francesca Falzon   +3 more
openalex   +1 more source

Digital Citizenship and Surveillance| Compromising Over Technology, Security, and Privacy — Commentary

open access: yesInternational Journal of Communication, 2017
The post-Snowden debates have often referred to an alleged trade-off between human rights and security that digital citizens need to negotiate, and to a balance that needs to be struck by policy makers. In this brief commentary, Gus Hosein problematizes
Gus Hosein
doaj   +2 more sources

Assessing Optimizer Impact on DNN Model Sensitivity to Adversarial Examples

open access: yesIEEE Access, 2019
Deep Neural Networks (DNNs) have been gaining state-of-the-art achievement compared with many traditional Machine Learning (ML) models in diverse fields. However, adversarial examples challenge the further deployment and application of DNNs. Analysis has
Yixiang Wang   +5 more
doaj   +1 more source

Detecting Android Locker-Ransomware on Chinese Social Networks

open access: yesIEEE Access, 2019
In recent years, an increasing amount of locker-ransomware has been posing a great threat to the Android platform as well as users' properties. Locker-ransomware blackmails victims for ransom by compulsorily locking the devices.
Dan Su   +3 more
doaj   +1 more source

Comprehensive Survey on Big Data Privacy Protection [PDF]

open access: gold, 2019
Mohammed Binjubeir   +4 more
openalex   +1 more source

Modeling data protection and privacy: application and experience with GDPR

open access: green, 2021
Damiano Torre   +4 more
openalex   +2 more sources

Home - About - Disclaimer - Privacy