"We are a startup to the core": A qualitative interview study on the security and privacy development practices in Turkish software startups [PDF]
Security and privacy are often neglected in software development, and rarely a priority for developers. This insight is commonly based on research conducted by researchers and on developer populations living and working in the United States, Europe, and the United Kingdom.
arxiv
Hardware security for software privacy support
The security level in existing workstation and server systems is not sufficient for most applications in a network environment. The processors only provide basic multitasking support, and any other security enforcement has to be carried out in the software layers.
Tanguy Gilmont+2 more
openaire +2 more sources
Privacy-preserving Cross-domain Routing Optimization -- A Cryptographic Approach [PDF]
Today's large-scale enterprise networks, data center networks, and wide area networks can be decomposed into multiple administrative or geographical domains. Domains may be owned by different administrative units or organizations. Hence protecting domain
Chen, Qingjun, Qian, Chen, Zhong, Sheng
core
ABSTRACT Objective Certain frontotemporal lobar degeneration subtypes, including TDP‐A and B, can either occur sporadically or in association with specific genetic mutations. It is uncertain whether syndromic or imaging features previously associated with these patient groups are subtype or genotype specific.
Sean Coulborn+17 more
wiley +1 more source
Arquitectura de software en wallet de código abierto para privacy coin en dispositivos móviles [PDF]
Francisco Gindre
openalex +1 more source
differential privacy for coverage analysis of software traces
This work considers software execution traces, where a trace is a sequence of run-time events. Each user of a software system collects the set of traces covered by her execution of the software, and reports this set to an analysis server. Our goal is to report the local data of each user in a privacy-preserving manner by employing local differential ...
Hao, Yu+4 more
openaire +4 more sources
Clinical Trial Readiness in Limb Girdle Muscular Dystrophy R1 (LGMDR1): A GRASP Consortium Study
ABSTRACT Objective Identifying functional measures that are both valid and reliable in the limb girdle muscular dystrophy (LGMD) population is critical for quantifying the level of functional impairment related to disease progression in order to establish clinical trial readiness in the context of anticipated therapeutic trials.
Stephanie M. Hunn+29 more
wiley +1 more source
Internet Privacy and Self-Regulation: Lessons from the Porn Wars [PDF]
The availability and adequacy of technical remedies ought to play a crucial role in evaluating the propriety of state action with regard to both the inhibition of Internet pornography and the promotion of Internet privacy.
Tom W. Bell
core
Retaining Expression on De-identified Faces [PDF]
© Springer International Publishing AG 2017The extensive use of video surveillance along with advances in face recognition has ignited concerns about the privacy of the people identifiable in the recorded documents.
AK Ho+18 more
core +2 more sources
OpenFL-XAI: Federated learning of explainable artificial intelligence models in Python
Artificial Intelligence (AI) systems play a significant role in manifold decision-making processes in our daily lives, making trustworthiness of AI more and more crucial for its widespread acceptance.
Mattia Daole+5 more
doaj