Results 31 to 40 of about 2,010,621 (347)

Inverse privacy

open access: yesCommunications of the ACM, 2016
Seeking a market-based solution to the problem of a person's unjustified inaccessibility to their private information.
Gurevich, Yuri   +2 more
openaire   +2 more sources

Machine-Readable Privacy Certificates for Services [PDF]

open access: yes, 2013
Privacy-aware processing of personal data on the web of services requires managing a number of issues arising both from the technical and the legal domain.
A. Cavoukian   +13 more
core   +1 more source

Bistochastic Privacy

open access: yes, 2022
We introduce a new privacy model relying on bistochastic matrices, that is, matrices whose components are nonnegative and sum to 1 both row-wise and column-wise. This class of matrices is used to both define privacy guarantees and a tool to apply protection on a data set.
Ruiz, Nicolas, Domingo-Ferrer, Josep
openaire   +2 more sources

Development and Analysis of Deterministic Privacy-Preserving Policies Using Non-Stochastic Information Theory [PDF]

open access: yes, 2019
A deterministic privacy metric using non-stochastic information theory is developed. Particularly, minimax information is used to construct a measure of information leakage, which is inversely proportional to the measure of privacy.
Farokhi, Farhad
core   +2 more sources

Composition Properties of Inferential Privacy for Time-Series Data

open access: yes, 2017
With the proliferation of mobile devices and the internet of things, developing principled solutions for privacy in time series applications has become increasingly important.
Chaudhuri, Kamalika, Song, Shuang
core   +1 more source

Systematic Review on Security and Privacy Requirements in Edge Computing: State of the Art and Future Research Opportunities [PDF]

open access: yes, 2020
Edge computing is a promising paradigm that enhances the capabilities of cloud computing. In order to continue patronizing the computing services, it is essential to conserve a good atmosphere free from all kinds of security and privacy breaches.
Ho, Anthony T. S.   +6 more
core   +2 more sources

Doppelganger Obfuscation — Exploring theDefensive and Offensive Aspects of Hardware Camouflaging

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2020
Hardware obfuscation is widely used in practice to counteract reverse engineering. In recent years, low-level obfuscation via camouflaged gates has been increasingly discussed in the scientific community and industry.
Max Hoffmann, Christof Paar
doaj   +3 more sources

JustSTART: How to Find an RSA Authentication Bypass on Xilinx UltraScale(+) with Fuzzing

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
Fuzzing is a well-established technique in the software domain to uncover bugs and vulnerabilities. Yet, applications of fuzzing for security vulnerabilities in hardware systems are scarce, as principal reasons are requirements for design information ...
Maik Ender   +4 more
doaj   +1 more source

Combining Popularity and Locality to Enhance In-Network Caching Performance and Mitigate Pollution Attacks in Content-Centric Networking

open access: yesIEEE Access, 2017
Content-centric networking (CCN) aims to improve network reliability, scalability, and security by changing the way that information is organized and retrieved in the current Internet. One critical issue in CCN is in-network cache allocation. It is known
Guozhi Zhang   +3 more
doaj   +1 more source

On the combination of data augmentation method and gated convolution model for building effective and robust intrusion detection

open access: yesCybersecurity, 2020
Deep learning (DL) has exhibited its exceptional performance in fields like intrusion detection. Various augmentation methods have been proposed to improve data quality and eventually to enhance the performance of DL models.
Yixiang Wang   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy