Results 101 to 110 of about 2,010,621 (347)

When are identification protocols with sparse challenges safe? The case of the Coskun and Herley attack

open access: yesJournal of Mathematical Cryptology, 2017
Cryptographic identification protocols enable a prover to prove its identity to a verifier. A subclass of such protocols are shared-secret challenge-response identification protocols in which the prover and the verifier share the same secret and the ...
Asghar Hassan Jameel, Kaafar Mohamed Ali
doaj   +1 more source

When and where do you want to hide? Recommendation of location privacy preferences with local differential privacy

open access: yes, 2019
In recent years, it has become easy to obtain location information quite precisely. However, the acquisition of such information has risks such as individual identification and leakage of sensitive information, so it is necessary to protect the privacy ...
A Wasef   +8 more
core   +3 more sources

Clinical Spectrum and Outcomes of SOX1 Antibody‐Associated Paraneoplastic Neurological Syndromes: A Chinese Cohort Study

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Background SOX1 antibody‐positive paraneoplastic neurological syndromes (PNS) exhibit significant population‐specific clinical heterogeneity. While Western cohorts predominantly manifest Lambert‐Eaton myasthenic syndrome (65%–80%), comprehensive clinical characterization and treatment response data in Asian populations remain critically ...
Jin‐Long Ye   +11 more
wiley   +1 more source

Averting Robot Eyes [PDF]

open access: yes, 2017
Home robots will cause privacy harms. At the same time, they can provide beneficial services—as long as consumers trust them. This Essay evaluates potential technological solutions that could help home robots keep their promises, avert their eyes, and ...
Grimm, Cindy M.   +3 more
core   +2 more sources

Antidiscriminatory Privacy

open access: yesSSRN Electronic Journal, 2018
Law often blocks sensitive personal information to prevent discrimination. It does so, however, without a theory or framework to determine when doing so is warranted. As a result, these measures produce mixed results. This article offers a theoretical framework for determining, with a view of preventing discrimination, when personal information should ...
openaire   +3 more sources

Remote Assessment of Ataxia Severity in SCA3 Across Multiple Centers and Time Points

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective Spinocerebellar ataxia type 3 (SCA3) is a genetically defined ataxia. The Scale for Assessment and Rating of Ataxia (SARA) is a clinician‐reported outcome that measures ataxia severity at a single time point. In its standard application, SARA fails to capture short‐term fluctuations, limiting its sensitivity in trials.
Marcus Grobe‐Einsler   +20 more
wiley   +1 more source

Differentially Private Empirical Risk Minimization [PDF]

open access: yes, 2011
Privacy-preserving machine learning algorithms are crucial for the increasingly common setting in which personal data, such as medical or financial records, are analyzed.
Anand D. Sarwate   +3 more
core   +2 more sources

Clustering Algorithm Reveals Dopamine‐Motor Mismatch in Cognitively Preserved Parkinson's Disease

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective To explore the relationship between dopaminergic denervation and motor impairment in two de novo Parkinson's disease (PD) cohorts. Methods n = 249 PD patients from Parkinson's Progression Markers Initiative (PPMI) and n = 84 from an external clinical cohort.
Rachele Malito   +14 more
wiley   +1 more source

Assessing Optimizer Impact on DNN Model Sensitivity to Adversarial Examples

open access: yesIEEE Access, 2019
Deep Neural Networks (DNNs) have been gaining state-of-the-art achievement compared with many traditional Machine Learning (ML) models in diverse fields. However, adversarial examples challenge the further deployment and application of DNNs. Analysis has
Yixiang Wang   +5 more
doaj   +1 more source

AnonPri: A Secure Anonymous Private Authentication Protocol for RFID Systems [PDF]

open access: yes, 1999
Privacy preservation in RFID systems is a very important issue in modern day world. Privacy activists have been worried about the invasion of user privacy while using various RFID systems and services.
Rahman, Farzana   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy