Results 91 to 100 of about 195,399 (280)
Protection of Big Data Privacy
In recent years, big data have become a hot research topic. The increasing amount of big data also increases the chance of breaching the privacy of individuals.
Abid Mehmood +4 more
doaj +1 more source
Directional Liquid Transport Enabled pH‐Responsive Hierarchical Composite for Enhanced Wound Healing
A hierarchical composite with a gradient architecture transitioning from hydrophobic to hydrophilic layers integrates diode‐like liquid transport, efficient water absorption, breathability, and mechanical robustness. This device enables a multifunctional therapeutic platform with pH‐responsive dual‐drug release, providing synergistic anti‐inflammatory ...
Baolin Wang +5 more
wiley +1 more source
Set intersection protocol with privacy preservation
The Private Set Intersection Protocol (PSI) is one of the fundamental primitives of secure multi-party computations. This primitive allows several parties who do not trust each other to work together to calculate the intersection of their secret sets ...
I. D. Ioganson
doaj +1 more source
A Comprehensive Location-Privacy-Awareness Task Selection Mechanism in Mobile Crowd-Sensing
With the boom in the production of smartphones and easy access to networks, mobile crowd-sensing (MCS) is becoming a promising and rapidly growing sensing paradigm for the Internet of Things (IoT).
Ke Yan +4 more
doaj +1 more source
Privacy Preserving Event Detection
This paper presents a privacy-preserving event detection scheme based on measurements made by a network of sensors. A diameter-like decision statistic made up of the marginal types of the measurements observed by the sensors is employed. The proposed detection scheme can achieve the best type-I error exponent as the type-II error rate is required to be
Xiaoshan Wang, Tan F. Wong
openaire +2 more sources
Light‐Induced Entropy for Secure Vision
This work realized a ternary true random number generator by exploiting stochastic traps emerging within multiple junction interfaces, and quantitatively validated the generation of high‐quality random numbers. Furthermore, it successfully demonstrated diverse applications, including AI‐resilient image security, thereby providing a valuable guide for ...
Juhyung Seo +9 more
wiley +1 more source
Enforcing Privacy in Decentralized Mobile Social Networks [PDF]
International audienceThis position paper first summarizes work done by the first author on location privacy and differential privacy. These techniques will help to solve privacy problems in decentralized mobile social networks, which is the main theme ...
Imine, Abdessamad +2 more
core +1 more source
Metamaterial Antennas Enhance MRI of the Eye and Occipital Brain
A radiofrequency antenna platform comprising planar and bend configurations is developed, incorporating structurally integrated epsilon‐negative metamaterial unit cells to enhance MRI. These antennas enable high‐resolution in vivo human MRI of the eye, orbit, and occipital brain. Comprehensive validation, including simulations, phantom experiments, SAR,
Nandita Saha +14 more
wiley +1 more source
A green, freeform manufacturing approach that utilizes robust aqueous two‐phase systems to create intricate and scalable photonic structures and non‐planar mechanochromic hydrogel actuators from plant‐based hydroxypropyl cellulose. This approach broadens the structural possibilities of sustainable photonic devices and mechanochromic systems, offering ...
Xiao Song +14 more
wiley +1 more source
Bidirectional Privacy Preservation in Web Services
In web-based services, users are often required to submit personal data, which may be shared with third parties. Although privacy regulations mandate the disclosure of intended recipients in privacy policies, this does not fully alleviate users’ privacy ...
Sumit Kumar Paul, D. A. Knox
doaj +1 more source

