Zobrazeno 1 - 10
of 13 370
pro vyhledávání: '"private information"'
Autor:
Jianxu WANG, Rui LI, Yin LI
Publikováno v:
网络与信息安全学报, Vol 10, Iss 4, Pp 159-174 (2024)
Efficient algorithms for online string pattern matching have been deemed crucial for cloud database retrieval. However, the potential leaking of search content has been recognized as a threat to users' privacy. Existing string pattern matching algori
Externí odkaz:
https://doaj.org/article/ff188ba69def45a3b21943150a7b80eb
Publikováno v:
ICT Express, Vol 10, Iss 4, Pp 891-894 (2024)
In this paper, we introduce new codes for the private information retrieval (PIR). The conventional Tian-Sun-Chen (TSC) scheme achieves PIR capacity under the perfect privacy conditions with the minimum message length. Based on the TSC scheme, weakly
Externí odkaz:
https://doaj.org/article/40d22333d6c14ef8afbcdb0af7ad02f6
Publikováno v:
Engineering, Vol 35, Iss , Pp 32-45 (2024)
This paper addresses a multi-agent scheduling problem with uniform parallel machines owned by a resource agent and competing jobs with dynamic arrival times that belong to different consumer agents. All agents are self-interested and rational with th
Externí odkaz:
https://doaj.org/article/cbfd0c9b7bed4f6ba4a9da11c3ecfd6b
Autor:
Ho Chi Ming
Publikováno v:
Panoeconomicus, Vol 71, Iss 1, Pp 95-118 (2024)
This study employs information economics and the financial intermediary theory to explore the influences of private information in virtual communities and financial technology (fintech) derived from virtual currency on financial stocks. The paper con
Externí odkaz:
https://doaj.org/article/fb5ff5db03774689b8ce619b569dd957
Autor:
Hassan A. Shafei, Chiu C. Tan
Publikováno v:
IEEE Access, Vol 12, Pp 40933-40946 (2024)
Voice-controlled systems have revolutionized user interactions, making technology more accessible and intuitive across various settings. In multi-user environments, such as households, voice assistants like Amazon Alexa are favored as they enable sea
Externí odkaz:
https://doaj.org/article/cee3cb3f63274b68b658dd4c57b6b848
Publikováno v:
Cybersecurity, Vol 6, Iss 1, Pp 1-10 (2023)
Abstract The computational complexity of privacy information retrieval protocols is often linearly related to database size. When the database size is large, the efficiency of privacy information retrieval protocols is relatively low. This paper desi
Externí odkaz:
https://doaj.org/article/9c66486065ac4ee08a82bc8cc031596a
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
International Journal of Applied Mathematics and Computer Science, Vol 33, Iss 3, Pp 463-478 (2023)
The design of incentive-compatible mechanisms for a certain class of finite Bayesian partially observable Markov games is proposed using a dynamic framework. We set forth a formal method that maintains the incomplete knowledge of both the Bayesian mo
Externí odkaz:
https://doaj.org/article/51e3e7fce7f9488a815d12792dfd088c
Autor:
Ganbing Li, Kai Zhu
Publikováno v:
China Journal of Accounting Research, Vol 17, Iss 1, Pp 100344- (2024)
This study shows that a decline in investment efficiency due to information asymmetry may not necessarily devalue a firm but may enhance its value instead. Firms base their investment decisions on both public and private information. However, effecti
Externí odkaz:
https://doaj.org/article/2383750e25264c95a5988e9d955d3aeb
Publikováno v:
Journal of King Saud University: Computer and Information Sciences, Vol 36, Iss 2, Pp 101903- (2024)
Private information retrieval (PIR) enables a client to search data from a single (or multiple) untrusted server, without revealing which entry was queried. PIR can be divided into two categories: information-theoretic PIR (IT-PIR) and computational
Externí odkaz:
https://doaj.org/article/eaed1cd0fa394a778143fe08015593de