Results 31 to 40 of about 2,010,621 (347)
Seeking a market-based solution to the problem of a person's unjustified inaccessibility to their private information.
Gurevich, Yuri +2 more
openaire +2 more sources
Machine-Readable Privacy Certificates for Services [PDF]
Privacy-aware processing of personal data on the web of services requires managing a number of issues arising both from the technical and the legal domain.
A. Cavoukian +13 more
core +1 more source
We introduce a new privacy model relying on bistochastic matrices, that is, matrices whose components are nonnegative and sum to 1 both row-wise and column-wise. This class of matrices is used to both define privacy guarantees and a tool to apply protection on a data set.
Ruiz, Nicolas, Domingo-Ferrer, Josep
openaire +2 more sources
Development and Analysis of Deterministic Privacy-Preserving Policies Using Non-Stochastic Information Theory [PDF]
A deterministic privacy metric using non-stochastic information theory is developed. Particularly, minimax information is used to construct a measure of information leakage, which is inversely proportional to the measure of privacy.
Farokhi, Farhad
core +2 more sources
Composition Properties of Inferential Privacy for Time-Series Data
With the proliferation of mobile devices and the internet of things, developing principled solutions for privacy in time series applications has become increasingly important.
Chaudhuri, Kamalika, Song, Shuang
core +1 more source
Systematic Review on Security and Privacy Requirements in Edge Computing: State of the Art and Future Research Opportunities [PDF]
Edge computing is a promising paradigm that enhances the capabilities of cloud computing. In order to continue patronizing the computing services, it is essential to conserve a good atmosphere free from all kinds of security and privacy breaches.
Ho, Anthony T. S. +6 more
core +2 more sources
Doppelganger Obfuscation — Exploring theDefensive and Offensive Aspects of Hardware Camouflaging
Hardware obfuscation is widely used in practice to counteract reverse engineering. In recent years, low-level obfuscation via camouflaged gates has been increasingly discussed in the scientific community and industry.
Max Hoffmann, Christof Paar
doaj +3 more sources
JustSTART: How to Find an RSA Authentication Bypass on Xilinx UltraScale(+) with Fuzzing
Fuzzing is a well-established technique in the software domain to uncover bugs and vulnerabilities. Yet, applications of fuzzing for security vulnerabilities in hardware systems are scarce, as principal reasons are requirements for design information ...
Maik Ender +4 more
doaj +1 more source
Content-centric networking (CCN) aims to improve network reliability, scalability, and security by changing the way that information is organized and retrieved in the current Internet. One critical issue in CCN is in-network cache allocation. It is known
Guozhi Zhang +3 more
doaj +1 more source
Deep learning (DL) has exhibited its exceptional performance in fields like intrusion detection. Various augmentation methods have been proposed to improve data quality and eventually to enhance the performance of DL models.
Yixiang Wang +4 more
doaj +1 more source

