نتایج جستجو برای: enhancing values

تعداد نتایج: 601335  

2014
Ralf Brand Wanja Wolff Detlef Thieme

BACKGROUND Knowing and, if necessary, altering competitive athletes' real attitudes towards the use of banned performance-enhancing substances is an important goal of worldwide doping prevention efforts. However athletes will not always be willing to reporting their real opinions. Reaction time-based attitude tests help conceal the ultimate goal of measurement from the participant and impede st...

2011
Kevin S. Bauer Micah Sherr Dirk Grunwald

Tor is one of the most widely-used privacy enhancing technologies for achieving online anonymity and resisting censorship. Simultaneously, Tor is also an evolving research network on which investigators perform experiments to improve the network’s resilience to attacks and enhance its performance. Existing methods for studying Tor have included analytical modeling, simulations, small-scale netw...

2006
Davy Preuveneers Liesje Demuynck Bart Elen Kristof Verslype Bart De Decker Yolande Berbers Pierre Verbaeten

In this paper we discuss the problem of privacy and information disclosure in ubiquitous and pervasive computing environments. We describe a framework that uses context information to selectively disclose personal information to service providers while keeping the humancomputer interaction non-intrusive. For each interaction with a service provider, our framework will take previously disclosed ...

2016
Yang Wang

Privacy-enhancing technologies (PETs), which constitute a wide array of technical means for protecting users’ privacy, have gained considerable momentum in both academia and industry. However, existing surveys of PETs fail to delineate what sorts of privacy the described technologies enhance, which in turn makes it difficult to differentiate between the various PETs. Moreover, those surveys cou...

Journal: :Annales des Télécommunications 2006
Yves Deswarte Carlos Aguilar Melchor

This paper presents an overview of the current and next solutions for privacy protection on the Internet. We highlight five categories of Privacy Enhancing Technologies (PETS). First, we introduce the multiple virtual identities that can represent a person, and the way the person can manage them. Then, we focus on the untraceability problem, which has been a major field of research since the ve...

2008
Michele Luglio Cesare Roseti

An integrated satellite-HAPS system is particularly suitable for supporting emergency communications. A key element for the efficient adoption of such systems is the enhancement of transport layer capability to support TCP-based applications. This paper proposes a detailed analysis of TCP performance over the target scenario, involving a DVB-RCS protocol stack for satellite air interface. I-PEP...

2010
Kristof Verslype Pieter Verhaeghe Jorn Lapon Vincent Naessens Bart De Decker

PriMan is presented; privacy-preserving user-centric identity management middleware which defines and groups the required functionality. It offers the application developer a uniform technology-agnostic interface to use and combine different types of privacy enhancing technologies. Moreover, the PriMan framework defines all the components and their functionality required to raise the developmen...

Journal: :iranian journal of nursing and midwifery research 0
mohsen shahriari eesa mohammadi abbas abbaszadeh masoud bahrami

background: ethical values offer a framework for behavior assessment, and nursing values influence nurses’ goals, strategies,and actions. a literature review was adopted in order to determine and define ethical values for nurses. materials and methods: this literature review was conducted based on the centre for reviews and dissemination guidelines. the key words used to search relevant sources...

2017
Taegyu Kim Young Hoon Kim

BACKGROUND Despite the efforts of the World Anti-Doping Agency and national anti-doping agencies at the international level, a relatively low and steady rate of positive doping tests still persists all over the world. Evidence on adolescents using doping substances exists, and the proportion of adolescents engaging in doping practices is small but significant. In relation to the international r...

2007
Jan Zibuschka Lothar Fritsch Mike Radmacher Tobias Scherner Kai Rannenberg

Privacy in computerized environments is perceived very differently depending on the respective point of view. Often “privacy enhancing technologies” – initiated by the user, as a measure of self-defense – are seen as conflicting with business goals such as cost-efficiency, revenue assurance, and options for further business development based on existing data. This paper presents the design and ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید