نتایج جستجو برای: ouafi phan privacy model

تعداد نتایج: 2140727  

2016
Matthew D. Marrero

This study tested a conceptual model of adolescents' feelings of privacy invasion derived from CPM. Specifically, goals were to describe adolescents' expectations of privacy, to describe how often adolescents are exposed to behaviors that threaten privacy, and to test privacy beliefs, potentially invasive behaviors, and having things to hide as predictors of individual differences in feelings o...

Journal: :حقوق اسلامی 0
جلیل قنواتی استادیار دانشگاه تهران ـ پردیس قم حسین جاور استادیار دانشگاه حضرت معصومه

0

Journal: :IACR Cryptology ePrint Archive 2008
Jiqiang Lu Orr Dunkelman Nathan Keller Jongsung Kim

In this paper we apply impossible differential attacks to reduced round AES. Using various techniques, including the early abort approach and key schedule considerations, we significantly improve previously known attacks due to Bahrak-Aref and Phan. The improvement of these attacks leads to the best known impossible differential attacks on 7-round AES-128 and AES-192, as well as to the best kno...

2013
Huong Thi My Nguyen

A growing number of studies have examined the relationship between corporate governance and corporate entrepreneurship, with most finding that corporate governance has a significant influence (Zahra, 1996, Zahra et al., 2000b). However, the question of which ownership structure and governance mechanism most significantly drives corporate entrepreneurship in transitioning economies is still unde...

2004
Richard M. EPAND Phan VUONG Christopher M. YIP Shohei MAEKAWA Raquel F. EPAND

Richard M. EPAND*1, Phan VUONG†, Christopher M. YIP†, Shohei MAEKAWA‡ and Raquel F. EPAND* *Department of Biochemistry, McMaster University, Hamilton L8N 3Z5, ON, Canada, †Department of Chemical Engineering and Applied Chemistry, Institute of Biomaterials and Biomedical Engineering, University of Toronto, Toronto M5S 3G9, ON, Canada, and ‡Department of Bioinformation, Department of Life Science...

Journal: :IACR Cryptology ePrint Archive 2011
Donghoon Chang Mridul Nandi Moti Yung

The hash algorithm BLAKE, one of the SHA-3 finalists, was designed by Aumasson, Henzen, Meier, and Phan. Unlike other SHA-3 finalists, there is no known indifferentiable security proof on BLAKE. In this paper, we provide the indifferentiable security proof on BLAKE with the bound O( σ 2 2n−3 ), where σ is the total number of blocks of queries, and n is the hash output size.

Journal: :CoRR 2015
Chong Huang Lalitha Sankar Anand D. Sarwate

Businesses (retailers) often wish to offer personalized advertisements (coupons) to individuals (consumers), but run the risk of strong reactions from consumers who want a customized shopping experience but feel their privacy has been violated. Existing models for privacy such as differential privacy or information theory try to quantify privacy risk but do not capture the subjective experience...

2015
Michel Schreiner Thomas Hess

Monetizing their users’ personal information instead of charging a fee has become an established revenue model for platform operators—a new form of media companies specialized in aggregating, managing, and distributing user-generated online content. However, the commodification of privacy leads to privacy concerns that might be a risk for such businesses. Thus, a new approach is to focus on con...

Journal: :CoRR 2017
Marco Gaboardi Ryan M. Rogers

The local model for differential privacy is emerging as the reference model for practical applications of collecting and sharing sensitive information while satisfying strong privacy guarantees. In the local model, there is no trusted entity which is allowed to have each individual’s raw data as is assumed in the traditional curator model for differential privacy. Individuals’ data are usually ...

One of the most important dimensions in the design of Islamic buildings is the creation of privacy. The word ‘privacy’ means ‘environment’, referring to a place where its support and protecting is obligatory and as a whole, it is a barrier to avoid others’ assault. It is of utmost importance in traditional houses especially in Islamic countries the houses separate the family privacy from the st...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید