Results 21 to 30 of about 703,183 (313)

Formally verifying Kyber

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2023
In this paper we present the first formally verified implementations of Kyber and, to the best of our knowledge, the first such implementations of any post-quantum cryptosystem.
José Bacelar Almeida   +11 more
doaj   +1 more source

Scaling Exponents of Time Series Data: A Machine Learning Approach

open access: yesEntropy, 2023
In this study, we present a novel approach to estimating the Hurst exponent of time series data using a variety of machine learning algorithms. The Hurst exponent is a crucial parameter in characterizing long-range dependence in time series, and ...
Sebastian Raubitzek   +3 more
doaj   +1 more source

Privacy dynamics [PDF]

open access: yesProceedings of the 11th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, 2016
Privacy violations in online social networks (OSNs) often arise as a result of users sharing information with unintended audiences. One reason for this is that, although OSN capabilities for creating and managing social groups can make it easier to be selective about recipients of a given post, they do not provide enough guidance to the users to make ...
Calikli, Gul   +8 more
openaire   +3 more sources

Listening to bluetooth beacons for epidemic risk mitigation

open access: yesScientific Reports, 2022
The ongoing COVID-19 pandemic let to efforts to develop and deploy digital contact tracing systems to expedite contact tracing and risk notification. Unfortunately, the success of these systems has been limited, partly owing to poor interoperability with
Gilles Barthe   +10 more
doaj   +1 more source

Privacy Profiles and Amplification by Subsampling

open access: yesThe Journal of Privacy and Confidentiality, 2020
Differential privacy provides a robust quantifiable methodology to measure and control the privacy leakage of data analysis algorithms. A fundamental insight is that by forcing algorithms to be randomized, their privacy leakage can be characterized by ...
Borja Balle   +2 more
doaj   +1 more source

An Incremental Self-Labeling Strategy for Semi-Supervised Deep Learning Based on Generative Adversarial Networks

open access: yesIEEE Access, 2020
The recent success of deep neural networks is attributed in part to large-scale well-labeled training data. However, with the ever-increasing size of modern datasets, combined with the difficulty of obtaining label information, semi-supervised learning ...
Xiaotao Wei   +4 more
doaj   +1 more source

Comprehensive quantitative analysis on privacy leak behavior. [PDF]

open access: yesPLoS ONE, 2013
Privacy information is prone to be leaked by illegal software providers with various motivations. Privacy leak behavior has thus become an important research issue of cyber security.
Lejun Fan   +5 more
doaj   +1 more source

Speranza: Usable, Privacy-friendly Software Signing

open access: yesProceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
15 pages, 5 ...
Kelsey Merrill   +3 more
openaire   +3 more sources

Towards a privacy debt

open access: yesIET Software, 2021
This study argues the difference between security and privacy and outlines the concept of Privacy Debt as a new Technical Debt. Privacy is gaining momentum in any software system due to mandatory compliance with respect to laws and regulations. There are
Xabier Larrucea   +2 more
doaj   +1 more source

VloGraph: A Virtual Knowledge Graph Framework for Distributed Security Log Analysis

open access: yesMachine Learning and Knowledge Extraction, 2022
The integration of heterogeneous and weakly linked log data poses a major challenge in many log-analytic applications. Knowledge graphs (KGs) can facilitate such integration by providing a versatile representation that can interlink objects of interest ...
Kabul Kurniawan   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy