نتایج جستجو برای: phan privacy model
تعداد نتایج: 2140719 فیلتر نتایج به سال:
In Information Processing Letters 110 (2) (2009) 57-61, Deursen and Radomirović evaluated five formal RFID privacy models. One main result is that Ha et al.’s RFID privacy model is incorrect. The supporting fact is that a constant-response protocol cannot pass the test of Ha et al.’s RFID privacy model. However, we demonstrate that the constant-response protocol is artificial, and the correspon...
Cross realm client-to-client password authenticated key exchange (C2C-PAKE) schemes are designed to enable two clients in different realms to agree on a common session key using different passwords. In 2006, Yin-Bao presented the first provably secure cross-realm C2C-PAKE, which security is proven rigorously within a formally defined security model and based on the hardness of some computationa...
Data release is likely to result in privacy disclosure, so appropriate privacy protection measures are required for various data release technologies in order to ensure the privacy and safety of information, while differential privacy as a reliable model for privacy protection is extensively researched and applied. This paper presents the histogram data publishing solutions under differential p...
In information privacy literature, limited attention was paid to the studies on the effects of a person’s privacy disposition on his/her privacy concerns. This relationship is of critical importance to privacy research, as privacy disposition is believed to be an important antecedent of privacy perceptions. In this study, a research model is developed to examine the impacts of a person’s privac...
leaving one’s parental home disrupts place attachment, described as the affective bond or link between one individual and a specific place and/or the people living in that place. in other words, because students move away from their parents, their friend and their hometown, their bonds with these people and their hometown are disrupted. although moving disrupts place attachment to their hometow...
As a new computing model, Granular computing provides a new efficient way for solving complicated problems, massive data mining, and fuzzy information processing. Privacy is becoming an increasingly important issue in many data mining applications. In this paper, we combined the existing model of granular computing with personalized privacy-preserving demand, and proposed a new granular computi...
Paradigm shift towards cloud computing offers plethora of advantages both for users and Cloud Service Provider (CSP). For users, it saving cost, scaling resources, pay per use, elastic on-demand services. On the other hand, centralized resource management provisioning operations, safety security CSP. By holding multiple virtual IT resources (CPUs, storage servers, network components software) o...
Social Media platforms have become a significant part of our daily lives and modern way to connect friends family, document lives, share other great personal information about lives. These activities leave us vulnerable privacy security breach due lapse controls necessary protect users' sensitive data on these platforms. We conducted exploratory analysis paramount social media such as Facebook ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید