Results 31 to 40 of about 1,768,773 (316)

Securing Systems With Indispensable Entropy: LWE-Based Lossless Computational Fuzzy Extractor for the Internet of Things

open access: yesIEEE Access, 2017
With the advent of the Internet of Things, lightweight devices necessitate secure and cost-efficient key storage. Since traditional secure key storage is expensive, novel solutions have been developed based on the idea of deriving the key from noisy ...
Christopher Huth   +4 more
doaj   +1 more source

On ADS-B Sensor Placement for Secure Wide-Area Multilateration

open access: yesProceedings, 2020
As automatic dependent surveillance–broadcast (ADS-B) becomes more prevalent, the placement of on-ground sensors is vital for Air Traffic Control (ATC) to control the airspace.
Ala’ Darabseh   +3 more
doaj   +1 more source

Couldn't or Wouldn't? the Influence of Privacy Concerns and Self-Efficacy in Privacy Management on Privacy Protection [PDF]

open access: yes, 2015
Sampling 515 college students, this study investigates how privacy protection, including profile visibility, self-disclosure, and friending, are influenced by privacy concerns and efficacy regarding one's own ability to manage privacy settings, a factor ...
Chen, Hsuan-Ting, Chen, Wenhong
core   +1 more source

The Economics of Privacy [PDF]

open access: yesJournal of Economic Literature, 2015
This article summarizes and draws connections among diverse streams of theoretical and empirical research on the economics of privacy. We focus on the economic value and consequences of protecting and disclosing personal information, and on consumers' understanding and decisions regarding the trade-offs associated with the privacy and the sharing of ...
Liad Wagman   +2 more
openaire   +3 more sources

Doppelganger Obfuscation — Exploring theDefensive and Offensive Aspects of Hardware Camouflaging

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2020
Hardware obfuscation is widely used in practice to counteract reverse engineering. In recent years, low-level obfuscation via camouflaged gates has been increasingly discussed in the scientific community and industry.
Max Hoffmann, Christof Paar
doaj   +3 more sources

Combining Popularity and Locality to Enhance In-Network Caching Performance and Mitigate Pollution Attacks in Content-Centric Networking

open access: yesIEEE Access, 2017
Content-centric networking (CCN) aims to improve network reliability, scalability, and security by changing the way that information is organized and retrieved in the current Internet. One critical issue in CCN is in-network cache allocation. It is known
Guozhi Zhang   +3 more
doaj   +1 more source

Acknowledgment to the Reviewers of Journal of Cybersecurity and Privacy in 2022

open access: yesJournal of Cybersecurity and Privacy, 2023
High-quality academic publishing is built on rigorous peer review [...]
Journal of Cybersecurity and Privacy Editorial Office
doaj   +1 more source

Redrawing the Boundaries on Purchasing Data from Privacy-Sensitive Individuals [PDF]

open access: yes, 2014
We prove new positive and negative results concerning the existence of truthful and individually rational mechanisms for purchasing private data from individuals with unbounded and sensitive privacy preferences. We strengthen the impossibility results of
Nissim, Kobbi   +2 more
core   +1 more source

Anonymous subject identification and privacy information management in video surveillance [PDF]

open access: yes, 2017
The widespread deployment of surveillance cameras has raised serious privacy concerns, and many privacy-enhancing schemes have been recently proposed to automatically redact images of selected individuals in the surveillance video for protection.
Barni, Mauro   +4 more
core   +1 more source

On Privacy [PDF]

open access: yes, 2013
Privacy is a Janus-faced value. It enables us to shut the world out, but the forms it takes and the extent to which it is protected are fundamentally public matters. Not surprisingly, then, privacy and its protection are the object of some of our most intractable conflicts over the proper role of the state and the rights and duties of individuals. This
openaire   +3 more sources

Home - About - Disclaimer - Privacy