Results 11 to 20 of about 643,939 (333)

Perceptions of ICT Practitioners Regarding Software Privacy [PDF]

open access: yesEntropy, 2020
During software development activities, it is important for Information and Communication Technology (ICT) practitioners to know and understand practices and guidelines regarding information privacy, as software requirements must comply with data privacy laws and members of development teams should know current legislation related to the protection of ...
Edna Dias Canedo   +4 more
openaire   +6 more sources

Security and Privacy Qualities of Medical Devices: An Analysis of FDA Postmarket Surveillance [PDF]

open access: yesPLoS ONE, 2012
Background: Medical devices increasingly depend on computing functions such as wireless communication and Internet connectivity for software-based control of therapies and network-based transmission of patients’ stored medical information.
Baker, Matthew Charles   +6 more
core   +4 more sources

Privacy concerns and protection behavior during the Covid-19 pandemic [PDF]

open access: yesProblems and Perspectives in Management, 2022
This paper aims to analyze the protection behavior of employees while working remotely during the Covid-19 pandemic using online video chat software.
Ranjany Sundaram, Snehal Shetty
doaj   +1 more source

PRESAGE: PRivacy-preserving gEnetic testing via SoftwAre Guard Extension [PDF]

open access: goldBMC Medical Genomics, 2017
Background Advances in DNA sequencing technologies have prompted a wide range of genomic applications to improve healthcare and facilitate biomedical research.
Feng Chen   +9 more
openalex   +3 more sources

Formally verifying Kyber

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2023
In this paper we present the first formally verified implementations of Kyber and, to the best of our knowledge, the first such implementations of any post-quantum cryptosystem.
José Bacelar Almeida   +11 more
doaj   +1 more source

Scaling Exponents of Time Series Data: A Machine Learning Approach

open access: yesEntropy, 2023
In this study, we present a novel approach to estimating the Hurst exponent of time series data using a variety of machine learning algorithms. The Hurst exponent is a crucial parameter in characterizing long-range dependence in time series, and ...
Sebastian Raubitzek   +3 more
doaj   +1 more source

Listening to bluetooth beacons for epidemic risk mitigation

open access: yesScientific Reports, 2022
The ongoing COVID-19 pandemic let to efforts to develop and deploy digital contact tracing systems to expedite contact tracing and risk notification. Unfortunately, the success of these systems has been limited, partly owing to poor interoperability with
Gilles Barthe   +10 more
doaj   +1 more source

A Systematic Mapping Study on Privacy by Design in Software Engineering

open access: diamondCLEI Electronic Journal, 2019
Protecting personal data in current software systems is a complex issue that requires legal regulations and constraints to manage personal data as well as a methodological support to develop software systems that would safeguard data privacy of their ...
Miguel Ehécatl Morales-Trujillo   +3 more
openalex   +4 more sources

Privacy Profiles and Amplification by Subsampling

open access: yesThe Journal of Privacy and Confidentiality, 2020
Differential privacy provides a robust quantifiable methodology to measure and control the privacy leakage of data analysis algorithms. A fundamental insight is that by forcing algorithms to be randomized, their privacy leakage can be characterized by ...
Borja Balle   +2 more
doaj   +1 more source

An Incremental Self-Labeling Strategy for Semi-Supervised Deep Learning Based on Generative Adversarial Networks

open access: yesIEEE Access, 2020
The recent success of deep neural networks is attributed in part to large-scale well-labeled training data. However, with the ever-increasing size of modern datasets, combined with the difficulty of obtaining label information, semi-supervised learning ...
Xiaotao Wei   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy