نتایج جستجو برای: phan privacy model

تعداد نتایج: 2140719  

Journal: :IACR Cryptology ePrint Archive 2012
Da-Zhi Sun

In Information Processing Letters 110 (2) (2009) 57-61, Deursen and Radomirović evaluated five formal RFID privacy models. One main result is that Ha et al.’s RFID privacy model is incorrect. The supporting fact is that a constant-response protocol cannot pass the test of Ha et al.’s RFID privacy model. However, we demonstrate that the constant-response protocol is artificial, and the correspon...

Journal: :IACR Cryptology ePrint Archive 2007
Fengjiao Wang Yuqing Zhang

Cross realm client-to-client password authenticated key exchange (C2C-PAKE) schemes are designed to enable two clients in different realms to agree on a common session key using different passwords. In 2006, Yin-Bao presented the first provably secure cross-realm C2C-PAKE, which security is proven rigorously within a formally defined security model and based on the hardness of some computationa...

Journal: :JSW 2016
Xiujin Shi Ling Zhou

Data release is likely to result in privacy disclosure, so appropriate privacy protection measures are required for various data release technologies in order to ensure the privacy and safety of information, while differential privacy as a reliable model for privacy protection is extensively researched and applied. This paper presents the histogram data publishing solutions under differential p...

2011
Yuan Li

In information privacy literature, limited attention was paid to the studies on the effects of a person’s privacy disposition on his/her privacy concerns. This relationship is of critical importance to privacy research, as privacy disposition is believed to be an important antecedent of privacy perceptions. In this study, a research model is developed to examine the impacts of a person’s privac...

Journal: :معماری و شهرسازی 0
علی اکبر جیدری عضو هیئت علمی دانشکده فنی دانشگاه یاسوج زهرا عبدی پور دانشجوی کارشناسی ارشد دانشگاه آزاد اسلامی واحد شیراز

leaving one’s parental home disrupts place attachment, described as the affective bond or link between one individual and a specific place and/or the people living in that place. in other words, because students move away from their parents, their friend and their hometown, their bonds with these people and their hometown are disrupted. although moving disrupts place attachment to their hometow...

2009
Yanguang Shen Yonghong Liu Meiye Zhang

As a new computing model, Granular computing provides a new efficient way for solving complicated problems, massive data mining, and fuzzy information processing. Privacy is becoming an increasingly important issue in many data mining applications. In this paper, we combined the existing model of granular computing with personalized privacy-preserving demand, and proposed a new granular computi...

Journal: :International Journal of Production Research 2009

Journal: :Advances in parallel computing 2021

Paradigm shift towards cloud computing offers plethora of advantages both for users and Cloud Service Provider (CSP). For users, it saving cost, scaling resources, pay per use, elastic on-demand services. On the other hand, centralized resource management provisioning operations, safety security CSP. By holding multiple virtual IT resources (CPUs, storage servers, network components software) o...

Journal: :Proceedings of the ... international conference on information warfare and security 2022

Social Media platforms have become a significant part of our daily lives and modern way to connect friends family, document lives, share other great personal information about lives. These activities leave us vulnerable privacy security breach due lapse controls necessary protect users' sensitive data on these platforms. We conducted exploratory analysis paramount social media such as Facebook ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید