نتایج جستجو برای: ouafi phan privacy model
تعداد نتایج: 2140727 فیلتر نتایج به سال:
The lack of a formal model in wireless location privacy protection research makes it difficult to evaluate new location privacy protection proposals, and difficult to utilize existing research results in anonymous communication into this new problem. In this paper, we analyze a wireless location privacy protection system (WLP S), and generalize it to a MIX based formal model, which includes a M...
Big data has been arising a growing interest in both scien- tific and industrial fields for its potential value. However, before employing big data technology into massive appli- cations, a basic but also principle topic should be investigated: security and privacy. One of the biggest concerns of big data is privacy. However, the study on big data privacy is still at a very early stage. Many or...
Tien Manh Huynh, Quang Dinh Le, Mai Ngoc Luu, Tram Thi Huyen Nguyen, Quy Nhuan Bui, Anh Phan Tuong Mai, Thang Hiep Duc Tran, Hien Minh Cong Hong Vo, and Trong Quach. Int J Gastrointest Interv 2022;11:135-8. https://doi.org/10.18528/ijgii220007
Publishing data for analysis from a micro data table containing sensitive attributes, while maintaining individual privacy, is a problem of increasing significance today. The k-anonymity model was proposed for privacy preserving data publication. While focusing on identity disclosure, k-anonymity model fails to protect attribute disclosure to some extent. Many efforts are made to enhance the k-...
Privacy is a major concern in RFID systems, especially with widespread deployment of wireless enabled interconnected personal devices. In this paper, we consider privacy issues in RFID systems where the authorized readers must be able to identify tags without an adversary being able to trace them, and provide a formal security model for privacy in RFID system. Under this model, we analyze the r...
Privacy is a major concern in RFID systems, especially with widespread deployment of wireless enabled interconnected personal devices. In this paper, we consider privacy issues in RFID system where the authorized readers must be able to identify tags without an adversary being able to trace them, and provide a formal security model for privacy in RFID system. Under this model, we analyze the re...
Many scenarios require computing the join of databases held by two or more parties that do not trust one another. Private record linkage is a cryptographic tool that allows such a join to be computed without leaking any information about records that do not participate in the join output. However, such strong security comes with a cost: except for exact equi-joins, these techniques have a high ...
The major challenge of data perturbation is to achieve the desired balance between the level of privacy guarantee and the level of data utility. Data privacy and data utility are commonly considered as a pair of conflicting requirements in privacy-preserving data mining systems and applications. Multiplicative perturbation algorithms aim at improving data privacy while maintaining the desired l...
This paper develops a theoretical model to help answer the following question— what influences an individual’s opinions regarding the right to privacy of others (individuals, organizations, and governments)? This question is particularly relevant for organizations and governments, for whom insider threats to corporate or government privacy present a dangerous risk. We draw from three bases of l...
Many wearable devices identify themselves in a pervasive way. But at the same time, people want to remain anonymous. Modeling anonymity and unlinkability in identification protocols is a delicate issue. In this paper, we revisit the privacy model from Asiacrypt 2007. We show how to achieve forward-privacy (in the V07 sense) using an IND-CCA secure cryptosystem with the PKC protocol. We review t...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید