Results 21 to 30 of about 13,284 (309)

Trusted computing

open access: yes, 2014
Die Trusted Computing Initiative ist ein Zusammenschluss mehrerer Soft- und Hardwarehersteller, die sich zum Ziel gesetzt haben, Computersysteme sicherer zu machen. Es wird allgemein angenommen, dass Hardware schwerer zu manipulieren ist als Software. Vorhandene hardwaregestützte Sicherheitsmechanismen, wie z.B.
Hoffmann, Johannes, Neubauer, Johannes
openaire   +2 more sources

Trust and Trusted Computing Platforms [PDF]

open access: yes, 2011
Hardware-based trusted computing platforms are intended to overcome many of the problems of trust that are prominent in computing systems. In this paper, a result of the Software Engineering Institute's Independent Research and Development Project "Trusted Computing in Extreme Adversarial Environments: Using Trusted Hardware as a Foundation for Cyber ...
Fisher, David   +2 more
openaire   +1 more source

Android Data-Clone Attack via Operating System Customization

open access: yesIEEE Access, 2020
To avoid the inconvenience of retyping a user's ID and password, most mobile apps now provide the automatic login feature for a better user experience. To this end, auto-login credential is stored locally on the smartphone.
Wenna Song   +7 more
doaj   +1 more source

A Review of Differential Privacy in Individual Data Release

open access: yesInternational Journal of Distributed Sensor Networks, 2015
The rapid development of mobile technology has improved users' quality of treatment, and tremendous amounts of medical information are readily available and widely used in data analysis and application, which bring on serious threats to users' privacy ...
Jun Wang, Shubo Liu, Yongkai Li
doaj   +1 more source

Privacy Inference Attack Against Users in Online Social Networks: A Literature Review

open access: yesIEEE Access, 2021
With the rapid development of social networks, users pay more and more attention to the protection of personal information. However, the transmission of users’ personal information through social networks will inevitably lead to privacy leakage ...
Yangheran Piao, Kai Ye, Xiaohui Cui
doaj   +1 more source

Food Public Opinion Prevention and Control Model Based on Sentiment Analysis

open access: yesFoods
Food public opinion is characterized by its low ignition point, high diffusibility, persistence, and strong negativity, which significantly impact food safety and consumer trust. This paper introduces the Food Public Opinion Prevention and Control (FPOPC)
Leiyang Chen   +5 more
doaj   +1 more source

Enhancing the Security of Deep Learning Steganography via Adversarial Examples

open access: yesMathematics, 2020
Steganography is a collection of techniques for concealing the existence of information by embedding it within a cover. With the development of deep learning, some novel steganography methods have appeared based on the autoencoder or generative ...
Yueyun Shang   +3 more
doaj   +1 more source

A Data Sharing Scheme for GDPR-Compliance Based on Consortium Blockchain

open access: yesFuture Internet, 2021
After the General Data Protection Regulation (GDPR) was introduced, some organizations and big data companies shared data without conducting any privacy protection and compliance authentication, which endangered user data security, and were punished ...
Yangheran Piao, Kai Ye, Xiaohui Cui
doaj   +1 more source

Trajectory-user linking via supervised encoding

open access: yesSecurity and Safety
With the explosive growth of Location-Based Services (LBS), a substantial amount of geolocation data, containing end-user private information, is amassed, posing severe privacy risks.
Hu Chengrui   +5 more
doaj   +1 more source

Parent‐to‐Child Information Disclosure in Pediatric Oncology

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background Despite professional consensus regarding the importance of open communication with pediatric cancer patients about their disease, actual practice patterns of disclosure are understudied. Extant literature suggests a significant proportion of children are not told about their diagnosis/prognosis, which is purported to negatively ...
Rachel A. Kentor   +12 more
wiley   +1 more source

Home - About - Disclaimer - Privacy