標(biāo)題: Titlebook: Data Privacy Management, Cryptocurrencies and Blockchain Technology; ESORICS 2021 Interna Joaquin Garcia-Alfaro,Jose Luis Mu?oz-Tapia,Migue [打印本頁(yè)] 作者: Prehypertension 時(shí)間: 2025-3-21 17:21
書(shū)目名稱Data Privacy Management, Cryptocurrencies and Blockchain Technology影響因子(影響力)
書(shū)目名稱Data Privacy Management, Cryptocurrencies and Blockchain Technology影響因子(影響力)學(xué)科排名
書(shū)目名稱Data Privacy Management, Cryptocurrencies and Blockchain Technology網(wǎng)絡(luò)公開(kāi)度
書(shū)目名稱Data Privacy Management, Cryptocurrencies and Blockchain Technology網(wǎng)絡(luò)公開(kāi)度學(xué)科排名
書(shū)目名稱Data Privacy Management, Cryptocurrencies and Blockchain Technology被引頻次
書(shū)目名稱Data Privacy Management, Cryptocurrencies and Blockchain Technology被引頻次學(xué)科排名
書(shū)目名稱Data Privacy Management, Cryptocurrencies and Blockchain Technology年度引用
書(shū)目名稱Data Privacy Management, Cryptocurrencies and Blockchain Technology年度引用學(xué)科排名
書(shū)目名稱Data Privacy Management, Cryptocurrencies and Blockchain Technology讀者反饋
書(shū)目名稱Data Privacy Management, Cryptocurrencies and Blockchain Technology讀者反饋學(xué)科排名
作者: 傳授知識(shí) 時(shí)間: 2025-3-21 22:41
Community Research for Community Developmentccuracy. The main idea of SPGC is to .. We also created an implementation of SPGC and used it in experiments to measure its accuracy and training time. The results show that SPGC is more accurate than a naive protocol based on local differential privacy by up?to 5.6%.作者: 細(xì)微的差異 時(shí)間: 2025-3-22 01:30 作者: 心痛 時(shí)間: 2025-3-22 07:05
Interdependent Privacy Issues Are Pervasive Among Third-Party Applicationsat interdependent privacy risks are enabled by certain permissions in all platforms studied, and actual apps request these permissions instantiating these risks. We also identify potential risk signals, and discuss solutions which could improve transparency and control for users, developers and platform owners.作者: exhilaration 時(shí)間: 2025-3-22 11:31
SPGC: An Integrated Framework of?Secure Computation and?Differential Privacy for?Collaborative Learnccuracy. The main idea of SPGC is to .. We also created an implementation of SPGC and used it in experiments to measure its accuracy and training time. The results show that SPGC is more accurate than a naive protocol based on local differential privacy by up?to 5.6%.作者: ASSET 時(shí)間: 2025-3-22 13:01 作者: ASSET 時(shí)間: 2025-3-22 20:39 作者: Trochlea 時(shí)間: 2025-3-23 00:04 作者: 保存 時(shí)間: 2025-3-23 03:25 作者: Genome 時(shí)間: 2025-3-23 08:55
Community Research for Community Developmentgregator sends the merged decision tree to the distributed devices. Therefore, we aim to build a joint machine learning model based on the data from multiple devices while offering .-anonymity to the participants.作者: 該得 時(shí)間: 2025-3-23 09:51
https://doi.org/10.1057/9780230339323e transmission of information that can be linked to a particular vehicle. The complexity of its processing in both transmitting and receiving ends is kept at minimum and is simpler than CAM and BSM processing. Our simulation result indicates that this new scheme is highly effective if the density of vehicles with V2X technology is limited.作者: HEAVY 時(shí)間: 2025-3-23 14:05
Asha Bedar,Diane Bretherton,Anouk Ridech as: conditional masking, robustness to illegal values, enforcement of both format and masking restrictions, and semantic data fabrication. Magen has been integrated as a cloud SaaS within IBM Data and AI offerings and has proved its value in various use cases.作者: 善于騙人 時(shí)間: 2025-3-23 21:30
Community Revival in the Wake of Disasteromputes the original output from the projected input. Thus, we achieve a program variant which is compliant with data minimization. We define the approach, show how it can be used for different scenarios, and give examples for how to compute such a decomposition.作者: 駭人 時(shí)間: 2025-3-23 22:58
https://doi.org/10.1007/978-3-319-31072-5ranking changes. As a result, we provide indications that we can use ranking changes to detect malicious activities. We also show a case study using this ranking to predict abnormal behavior in the network.作者: 無(wú)能力之人 時(shí)間: 2025-3-24 06:07 作者: 熱烈的歡迎 時(shí)間: 2025-3-24 07:34
A New Privacy Enhancing Beacon Scheme in?V2X Communicatione transmission of information that can be linked to a particular vehicle. The complexity of its processing in both transmitting and receiving ends is kept at minimum and is simpler than CAM and BSM processing. Our simulation result indicates that this new scheme is highly effective if the density of vehicles with V2X technology is limited.作者: barium-study 時(shí)間: 2025-3-24 13:53 作者: 馬賽克 時(shí)間: 2025-3-24 16:36
Towards a?Formal Approach for?Data Minimization in?Programs (Short Paper)omputes the original output from the projected input. Thus, we achieve a program variant which is compliant with data minimization. We define the approach, show how it can be used for different scenarios, and give examples for how to compute such a decomposition.作者: Organonitrile 時(shí)間: 2025-3-24 21:35
Using Degree Centrality to?Identify Market Manipulation on?Bitcoinranking changes. As a result, we provide indications that we can use ranking changes to detect malicious activities. We also show a case study using this ranking to predict abnormal behavior in the network.作者: 網(wǎng)絡(luò)添麻煩 時(shí)間: 2025-3-25 02:14
Making Decisions About Indicators measures include the certification of an information security management system, a periodic security auditing, and dedicated positions such as a Chief Information Officer (CIO). However, the effectiveness of introducing each of these measures to reduce the risk of data breach is unclear. To assess 作者: Externalize 時(shí)間: 2025-3-25 06:45
Community Quality-of-Life and Well-Being while protecting user privacy. However, existing location synthesizers do not consider friendship information of users. In particular, a co-location between friends is an important factor for synthesizing more realistic location traces..In this paper, we propose a novel location synthesizer that ge作者: Pituitary-Gland 時(shí)間: 2025-3-25 09:55
Making Decisions About Indicatorser. In this paper, we created and applied a quantitative privacy evaluation rubric to evaluate 10 distinct categories from the combined privacy policies (PP) and terms of service (ToS) from 188 companies in order to test whether those documents actually give an indication to the consumer as to their作者: Pseudoephedrine 時(shí)間: 2025-3-25 13:18 作者: Credence 時(shí)間: 2025-3-25 18:13 作者: 紀(jì)念 時(shí)間: 2025-3-25 22:06 作者: eczema 時(shí)間: 2025-3-26 01:58 作者: 完成才會(huì)征服 時(shí)間: 2025-3-26 08:14
Sports Volunteering and Community Engagementprotection regulations, including the EU General Data Protection Regulation (GDPR) and the California Consumer Protection Act (CCPA), set out strict restrictions and obligations on the collection and processing of personal data. Moreover, machine learning models themselves can be used to derive pers作者: instructive 時(shí)間: 2025-3-26 08:33
https://doi.org/10.1057/9780230339323tion. With this scheme, vehicles dynamically adjusts their periodic transmission of Cooperative Awareness Message (CAM) and Basic Safety Message (BSM) messages based on the observation of surroundings and transmit these messages only when it is necessary. This new scheme addresses the gap in standar作者: LANCE 時(shí)間: 2025-3-26 15:20
Asha Bedar,Diane Bretherton,Anouk RideOur graph-based policies and engine support the masking of composite payloads and recursively handles nested payloads based on their type (e.g., json in xml). The engine supports a myriad of advanced masking methods such as format preserving encryption and format preserving tokenization, enabling on作者: 一窩小鳥(niǎo) 時(shí)間: 2025-3-26 19:54 作者: byline 時(shí)間: 2025-3-27 00:30 作者: hypertension 時(shí)間: 2025-3-27 03:14
Miguel Martínez Lucio,Robert Perrettd processes adhere to a global, . failure model, typically only defined by bounds on the number of faulty processes. More flexible trust assumptions have recently been considered, especially in connection with blockchains. With ., in particular, a process is free to choose which other processes it t作者: cyanosis 時(shí)間: 2025-3-27 08:53 作者: CRUMB 時(shí)間: 2025-3-27 12:21
Data Privacy Management, Cryptocurrencies and Blockchain Technology978-3-030-93944-1Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: ingestion 時(shí)間: 2025-3-27 17:27 作者: Munificent 時(shí)間: 2025-3-27 19:27
https://doi.org/10.1007/978-3-030-93944-1anonymity and untracability; artificial intelligence; computer security; consensus mechanisms; cryptogra作者: 赦免 時(shí)間: 2025-3-28 00:05 作者: GEN 時(shí)間: 2025-3-28 04:03
0302-9743 were accepted out of 31 submissions. They were organized in topical sections as follows: Mining, consensus and market manipulation; smart contracts and anonymity..978-3-030-93943-4978-3-030-93944-1Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: Lethargic 時(shí)間: 2025-3-28 08:49
Making Decisions About Indicatorsn confounding factors. After investigating company attributes individually, we identify the significant confounding factors that represent obstacles to risk analysis. Using hypothesis testing and multiple logistic regression analysis, we adjust odds ratios for 17 security measures, social responsibi作者: anagen 時(shí)間: 2025-3-28 12:09
Community Quality-of-Life and Well-Beingr training data. We evaluate our synthesizer using the Foursquare dataset. Our experimental results show that our synthesizer preserves the information about co-locations and other statistical information (e.g., population distribution, transition matrix) while providing DP with a reasonable privacy作者: 使閉塞 時(shí)間: 2025-3-28 15:30 作者: Keratectomy 時(shí)間: 2025-3-28 19:26 作者: 濃縮 時(shí)間: 2025-3-28 23:25
Sports Volunteering and Community Engagementis work, we propose a method that is able to achieve better model accuracy by using the knowledge encoded within the trained model, and guiding our anonymization process to minimize the impact on the model’s accuracy, a process we call .. We demonstrate that by focusing on the model’s accuracy rathe作者: 按等級(jí) 時(shí)間: 2025-3-29 05:50
Miguel Martínez Lucio,Robert Perrett an ASIC token which is separate from the currency itself (the amount of stake equals your virtual computing power). In the other boundary case where virtual computers are free, we get a proof-of-burn equivalent. That is, a consensus mechanism in which miners ‘burn’ currency to obtain lottery ticket作者: 殺死 時(shí)間: 2025-3-29 08:47 作者: electrolyte 時(shí)間: 2025-3-29 15:04 作者: dandruff 時(shí)間: 2025-3-29 18:45
Quantitative Rubric for Privacy Policy Analysiscy policy analysis or by the results from our fake identities. In our analysis of 177 company documents, as 11 companies did not have any policies, we confirm the length and difficulty in reading in reading policies and find that companies adhere to jurisdiction-based regulations in addition to find作者: 疏忽 時(shí)間: 2025-3-29 23:24
Rethinking the?Limits of?Mobile Operating System Permissionsid mobile operating system producers start to introduce more fine-grained controls. In this paper, we examine the evolution of these controls since the widespread adoption of smartphones and examine the current trends. We describe research that has provided both an improved awareness of privacy and 作者: 基因組 時(shí)間: 2025-3-30 01:36
Anonymizing Machine Learning Modelsis work, we propose a method that is able to achieve better model accuracy by using the knowledge encoded within the trained model, and guiding our anonymization process to minimize the impact on the model’s accuracy, a process we call .. We demonstrate that by focusing on the model’s accuracy rathe作者: 尊重 時(shí)間: 2025-3-30 06:02 作者: 能得到 時(shí)間: 2025-3-30 10:24
Data Privacy Management, Cryptocurrencies and Blockchain TechnologyESORICS 2021 Interna作者: DEMUR 時(shí)間: 2025-3-30 16:22 作者: beta-carotene 時(shí)間: 2025-3-30 17:35
Best Security Measures to Reduce Cyber-Incident and Data Breach Risks measures include the certification of an information security management system, a periodic security auditing, and dedicated positions such as a Chief Information Officer (CIO). However, the effectiveness of introducing each of these measures to reduce the risk of data breach is unclear. To assess