نتایج جستجو برای: security and privacy
تعداد نتایج: 16851797 فیلتر نتایج به سال:
A quantification of process’s security by differential privacy is defined and studied in the framework of probabilistic process algebras. The resulting (quantitative) security properties are studied and compared with other (qualitative) security notions.
A long-overdue discussion of security and privacy is taking place within the US and among its friends and associates in many parts of the globe. In large part, this is due to the revelations of Edward Snowden, the employee of a government contractor, who leaked secret information about the extent of US government data collection on the calling habits of US residents. Privacy is often pitted aga...
What are the crucial innovations in the history of security and privacy? The crucial innovations are related to our ability to make boundaries where there are none. We understand this now, but we haven’t for very long. In the electronic world, there are no natural boundaries, whether we are talking about national boundaries, corporate boundaries, or even the difference between my e-mail and me ...
RFID (Radio Frequency Identification) technology is increasingly entering many domains on the grounds of improving efficiency and security. This paper aims to survey the issues associated with RFID security, current state of security techniques, their advantages and weaknesses, as well as potential implications with respect to privacy. INTRODUCTION Radio Frequency Identification (RFID) is an em...
C rowdsensing—the crowdsourcing of sensor data—allows for real-time data gathering with greater reach and accessibility than traditional crowdsourcing, because it leverages personal mobile devices as its sensor nodes (see Figure 1). This makes large-scale participatory sensing viable with little or no infrastructure cost, and because mobile device users can freely move around, coverage of senso...
Blockchain is an emerging technology for decentralized and transactional data sharing across a large network of untrusted participants. It enables new forms of distributed software architectures, where components can find agreements on their shared states without trusting a central integration point or any particular participating components. Considering the block- chain as a software connector...
Blockchain is an emerging technology for decentralized and transactional data sharing across a large network of untrusted participants. It enables new forms of distributed software architectures, where components can find agreements on their shared states without trusting a central integration point or any particular participating components. Considering the block- chain as a software connector...
Electronic health record (EHR) system facilitates integrating patients' medical information and improves service productivity. However, user access to patient data in a privacy-preserving manner is still challenging problem. Many studies concerned with security and privacy in EHR systems. Rezaeibagha and Mu [1] have proposed a hybrid architecture for privacy-preserving accessing patient records...
BACKGROUND The importance of health privacy protections in the era of the "Facebook Generation" has been called into question. The ease with which younger people share personal information about themselves has led to the assumption that they are less concerned than older generations about the privacy of their information, including health information. We explored whether survey respondents' vie...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید