نتایج جستجو برای: phan privacy model
تعداد نتایج: 2140719 فیلتر نتایج به سال:
A growing number of studies have examined the relationship between corporate governance and corporate entrepreneurship, with most finding that corporate governance has a significant influence (Zahra, 1996, Zahra et al., 2000b). However, the question of which ownership structure and governance mechanism most significantly drives corporate entrepreneurship in transitioning economies is still unde...
Richard M. EPAND*1, Phan VUONG†, Christopher M. YIP†, Shohei MAEKAWA‡ and Raquel F. EPAND* *Department of Biochemistry, McMaster University, Hamilton L8N 3Z5, ON, Canada, †Department of Chemical Engineering and Applied Chemistry, Institute of Biomaterials and Biomedical Engineering, University of Toronto, Toronto M5S 3G9, ON, Canada, and ‡Department of Bioinformation, Department of Life Science...
The hash algorithm BLAKE, one of the SHA-3 finalists, was designed by Aumasson, Henzen, Meier, and Phan. Unlike other SHA-3 finalists, there is no known indifferentiable security proof on BLAKE. In this paper, we provide the indifferentiable security proof on BLAKE with the bound O( σ 2 2n−3 ), where σ is the total number of blocks of queries, and n is the hash output size.
Businesses (retailers) often wish to offer personalized advertisements (coupons) to individuals (consumers), but run the risk of strong reactions from consumers who want a customized shopping experience but feel their privacy has been violated. Existing models for privacy such as differential privacy or information theory try to quantify privacy risk but do not capture the subjective experience...
Monetizing their users’ personal information instead of charging a fee has become an established revenue model for platform operators—a new form of media companies specialized in aggregating, managing, and distributing user-generated online content. However, the commodification of privacy leads to privacy concerns that might be a risk for such businesses. Thus, a new approach is to focus on con...
The local model for differential privacy is emerging as the reference model for practical applications of collecting and sharing sensitive information while satisfying strong privacy guarantees. In the local model, there is no trusted entity which is allowed to have each individual’s raw data as is assumed in the traditional curator model for differential privacy. Individuals’ data are usually ...
One of the most important dimensions in the design of Islamic buildings is the creation of privacy. The word ‘privacy’ means ‘environment’, referring to a place where its support and protecting is obligatory and as a whole, it is a barrier to avoid others’ assault. It is of utmost importance in traditional houses especially in Islamic countries the houses separate the family privacy from the st...
The lack of a formal model in wireless location privacy protection research makes it difficult to evaluate new location privacy protection proposals, and difficult to utilize existing research results in anonymous communication into this new problem. In this paper, we analyze a wireless location privacy protection system (WLP S), and generalize it to a MIX based formal model, which includes a M...
Big data has been arising a growing interest in both scien- tific and industrial fields for its potential value. However, before employing big data technology into massive appli- cations, a basic but also principle topic should be investigated: security and privacy. One of the biggest concerns of big data is privacy. However, the study on big data privacy is still at a very early stage. Many or...
Tien Manh Huynh, Quang Dinh Le, Mai Ngoc Luu, Tram Thi Huyen Nguyen, Quy Nhuan Bui, Anh Phan Tuong Mai, Thang Hiep Duc Tran, Hien Minh Cong Hong Vo, and Trong Quach. Int J Gastrointest Interv 2022;11:135-8. https://doi.org/10.18528/ijgii220007
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید