Zobrazeno 1 - 10
of 4 365
pro vyhledávání: '"Information leakage"'
Publikováno v:
ICT Express, Vol 10, Iss 4, Pp 891-894 (2024)
In this paper, we introduce new codes for the private information retrieval (PIR). The conventional Tian-Sun-Chen (TSC) scheme achieves PIR capacity under the perfect privacy conditions with the minimum message length. Based on the TSC scheme, weakly
Externí odkaz:
https://doaj.org/article/40d22333d6c14ef8afbcdb0af7ad02f6
Publikováno v:
Journal of King Saud University: Computer and Information Sciences, Vol 36, Iss 5, Pp 102060- (2024)
Over the years, a number of biometric template protection schemes, often based on the notion of “cancelable biometrics”, have been proposed. An ideal cancelable biometric algorithm complies with four criteria: irreversibility, revocability, unlin
Externí odkaz:
https://doaj.org/article/854330dd2312434e89a0882b12c95d4a
Publikováno v:
IEEE Access, Vol 12, Pp 146818-146829 (2024)
The rapid evolution of the digital landscape through advancements in electronic devices, wireless communication, and electromagnetic wave technologies has brought both convenience and new security concerns. One such security challenge is TEMPEST (Tra
Externí odkaz:
https://doaj.org/article/898c6a380ec4483aa29bde4040558fd3
Publikováno v:
IEEE Access, Vol 12, Pp 105258-105267 (2024)
Existing archive formats provide encryption to protect data, but vulnerabilities in these formats can lead to data leakage. This study proposes a novel attack to leak original data from encrypted archive files by exploiting the integrity check value
Externí odkaz:
https://doaj.org/article/065a948925a04a1b94a258bffd80d817
Autor:
Ravi B. D. Figueiredo, Hugo A. Mendes
Publikováno v:
IEEE Access, Vol 12, Pp 47646-47655 (2024)
Random splitting strategy is a common approach for training, testing, and validating object detection algorithms based on deep learning. Is common for datasets to have images extracted from video sources, in which there are frames with high spatial c
Externí odkaz:
https://doaj.org/article/5252f48f47804fa2861c40cc148adf8f
Autor:
Lobão, Júlio, Baptista, Sofia P.
Publikováno v:
Studies in Economics and Finance, 2023, Vol. 40, Issue 5, pp. 913-931.
Externí odkaz:
http://www.emeraldinsight.com/doi/10.1108/SEF-06-2023-0327
Autor:
Silvia ZAHARCO
Publikováno v:
Economica, Vol 2, Iss 124, Pp 70-79 (2023)
This study analyses the ways of leaking confidential information, the circumstances of legal presentation of the information related to the activity of entities, as well as the responsibilities related to the disclosure of confidential data. The
Externí odkaz:
https://doaj.org/article/f5b7ba488d6d4cd9a645084e0137b294
Publikováno v:
IEEE Access, Vol 11, Pp 146223-146237 (2023)
Dynamic searchable symmetric encryption (DSSE) enables users to outsource their data while retaining the capability to search and update on the encrypted database. Although various DSSE schemes have been proposed to achieve higher efficiency and stro
Externí odkaz:
https://doaj.org/article/f83ed0aac89a4aa2b17e7d2daf8908a5
Autor:
Qingkun Zhu
Publikováno v:
International Journal of Intelligent Networks, Vol 4, Iss , Pp 253-260 (2023)
Rapid computer and internet technology advancements have catalyzed continuous breakthroughs and innovations in related fields, significantly impacting social production and individual lifestyles. A critical challenge addressed here is the inadequacy
Externí odkaz:
https://doaj.org/article/ebf22302fd4e418885407918463a6c2e
Publikováno v:
Aslib Journal of Information Management, 2021, Vol. 74, Issue 5, pp. 901-927.
Externí odkaz:
http://www.emeraldinsight.com/doi/10.1108/AJIM-05-2021-0144