Results 91 to 100 of about 195,399 (280)

Protection of Big Data Privacy

open access: yesIEEE Access, 2016
In recent years, big data have become a hot research topic. The increasing amount of big data also increases the chance of breaching the privacy of individuals.
Abid Mehmood   +4 more
doaj   +1 more source

Directional Liquid Transport Enabled pH‐Responsive Hierarchical Composite for Enhanced Wound Healing

open access: yesAdvanced Healthcare Materials, EarlyView.
A hierarchical composite with a gradient architecture transitioning from hydrophobic to hydrophilic layers integrates diode‐like liquid transport, efficient water absorption, breathability, and mechanical robustness. This device enables a multifunctional therapeutic platform with pH‐responsive dual‐drug release, providing synergistic anti‐inflammatory ...
Baolin Wang   +5 more
wiley   +1 more source

Set intersection protocol with privacy preservation

open access: yesНаучно-технический вестник информационных технологий, механики и оптики
The Private Set Intersection Protocol (PSI) is one of the fundamental primitives of secure multi-party computations. This primitive allows several parties who do not trust each other to work together to calculate the intersection of their secret sets ...
I. D. Ioganson
doaj   +1 more source

A Comprehensive Location-Privacy-Awareness Task Selection Mechanism in Mobile Crowd-Sensing

open access: yesIEEE Access, 2019
With the boom in the production of smartphones and easy access to networks, mobile crowd-sensing (MCS) is becoming a promising and rapidly growing sensing paradigm for the Internet of Things (IoT).
Ke Yan   +4 more
doaj   +1 more source

Privacy Preserving Event Detection

open access: yesIEEE Transactions on Information Theory
This paper presents a privacy-preserving event detection scheme based on measurements made by a network of sensors. A diameter-like decision statistic made up of the marginal types of the measurements observed by the sensors is employed. The proposed detection scheme can achieve the best type-I error exponent as the type-II error rate is required to be
Xiaoshan Wang, Tan F. Wong
openaire   +2 more sources

Light‐Induced Entropy for Secure Vision

open access: yesAdvanced Materials, EarlyView.
This work realized a ternary true random number generator by exploiting stochastic traps emerging within multiple junction interfaces, and quantitatively validated the generation of high‐quality random numbers. Furthermore, it successfully demonstrated diverse applications, including AI‐resilient image security, thereby providing a valuable guide for ...
Juhyung Seo   +9 more
wiley   +1 more source

Enforcing Privacy in Decentralized Mobile Social Networks [PDF]

open access: yes, 2014
International audienceThis position paper first summarizes work done by the first author on location privacy and differential privacy. These techniques will help to solve privacy problems in decentralized mobile social networks, which is the main theme ...
Imine, Abdessamad   +2 more
core   +1 more source

Metamaterial Antennas Enhance MRI of the Eye and Occipital Brain

open access: yesAdvanced Materials, EarlyView.
A radiofrequency antenna platform comprising planar and bend configurations is developed, incorporating structurally integrated epsilon‐negative metamaterial unit cells to enhance MRI. These antennas enable high‐resolution in vivo human MRI of the eye, orbit, and occipital brain. Comprehensive validation, including simulations, phantom experiments, SAR,
Nandita Saha   +14 more
wiley   +1 more source

Freeform Manufacturing of Plant‐Based Structural Colors for Scalable Photonic and Mechanochromic Devices

open access: yesAdvanced Materials, EarlyView.
A green, freeform manufacturing approach that utilizes robust aqueous two‐phase systems to create intricate and scalable photonic structures and non‐planar mechanochromic hydrogel actuators from plant‐based hydroxypropyl cellulose. This approach broadens the structural possibilities of sustainable photonic devices and mechanochromic systems, offering ...
Xiao Song   +14 more
wiley   +1 more source

Bidirectional Privacy Preservation in Web Services

open access: yesComputers
In web-based services, users are often required to submit personal data, which may be shared with third parties. Although privacy regulations mandate the disclosure of intended recipients in privacy policies, this does not fully alleviate users’ privacy ...
Sumit Kumar Paul, D. A. Knox
doaj   +1 more source

Home - About - Disclaimer - Privacy