Results 31 to 40 of about 150,216 (340)
Computational Trust Model for Repeated Trust Games [PDF]
Trust game is a money exchange game that has been widely used in behavioral economics for studying trust and collaboration between humans. In this game, exchange of money is entirely attributable to the existence of trust between users. The trust game could be one-shot, i.e. the game ends after one round of money exchange, or repeated, i.e.
Dang, Quang-Vinh, Ignat, Claudia-Lavinia
openaire +3 more sources
Android Data-Clone Attack via Operating System Customization
To avoid the inconvenience of retyping a user's ID and password, most mobile apps now provide the automatic login feature for a better user experience. To this end, auto-login credential is stored locally on the smartphone.
Wenna Song+7 more
doaj +1 more source
Privacy Inference Attack Against Users in Online Social Networks: A Literature Review
With the rapid development of social networks, users pay more and more attention to the protection of personal information. However, the transmission of users’ personal information through social networks will inevitably lead to privacy leakage ...
Yangheran Piao, Kai Ye, Xiaohui Cui
doaj +1 more source
Tree-formed Verification Data for Trusted Platforms
The establishment of trust relationships to a computing platform relies on validation processes. Validation allows an external entity to build trust in the expected behaviour of the platform based on provided evidence of the platform's configuration.
Andreas Brett+54 more
core +1 more source
Mandatory Enforcement of Privacy Policies using Trusted Computing Principles [PDF]
Modern communication systems and information technology create significant new threats to information privacy. In this paper, we discuss the need for proper privacy protection in cooperative intelligent transportation systems (cITS), one instance of such
Dietzel, Stefan+2 more
core +3 more sources
A Review of Differential Privacy in Individual Data Release
The rapid development of mobile technology has improved users' quality of treatment, and tremendous amounts of medical information are readily available and widely used in data analysis and application, which bring on serious threats to users' privacy ...
Jun Wang, Shubo Liu, Yongkai Li
doaj +1 more source
Enhancing the Security of Deep Learning Steganography via Adversarial Examples
Steganography is a collection of techniques for concealing the existence of information by embedding it within a cover. With the development of deep learning, some novel steganography methods have appeared based on the autoencoder or generative ...
Yueyun Shang+3 more
doaj +1 more source
Food Public Opinion Prevention and Control Model Based on Sentiment Analysis
Food public opinion is characterized by its low ignition point, high diffusibility, persistence, and strong negativity, which significantly impact food safety and consumer trust. This paper introduces the Food Public Opinion Prevention and Control (FPOPC)
Leiyang Chen+5 more
doaj +1 more source
Trajectory-user linking via supervised encoding
With the explosive growth of Location-Based Services (LBS), a substantial amount of geolocation data, containing end-user private information, is amassed, posing severe privacy risks.
Hu Chengrui+5 more
doaj +1 more source