Listing 1 - 10 of 20 | << page >> |
Sort by
|
Choose an application
secure computing --- precise computing --- intelligent computing --- software --- algorithms --- applications
Choose an application
The General Data Protection Regulation (GDPR) replaced the old and battered Data Protection Directive on 25 May 2018 after a long-drawn reform. The rapidly evolving technological landscape will test the ability of the GDPR to effectively achieve the goals of protecting personal data and the free movement of data. This book proposes a technological supplement to achieve the goal of data protection as enshrined in the GDPR. The proposal comes in the form of digital identity management platforms built on blockchain technology. However, the very structure of blockchain poses some significant challenges in terms of compatibility with the GDPR. Accordingly, the claim of GDPR being a technologically neutral legislation is examined. The compatibility of a blockchain-based solution is scrutinised on the parameters of data protection principles like accountability, data minimisation, control and data protection by design in conjunction with the right to be forgotten and right to data portability.
Blockchains (Databases) --- Data protection. --- Database security. --- Data base security --- Databases --- Computer security --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Block chains (Databases) --- Database security --- Distributed databases --- Security measures --- Blockchain Technology --- Data Protection Revolution --- Profiling --- Data Protection --- Secure Identity --- Blockchain --- Secure Privacy --- Uneasy Code --- Building-Blocks
Choose an application
This open access book describes the technologies needed to construct a secure big data infrastructure that connects data owners, analytical institutions, and user institutions in a circle of trust. It begins by discussing the most relevant technical issues involved in creating safe and privacy-preserving big data distribution platforms, and especially focuses on cryptographic primitives and privacy-preserving techniques, which are essential prerequisites. The book also covers elliptic curve cryptosystems, which offer compact public key cryptosystems; and LWE-based cryptosystems, which are a type of post-quantum cryptosystem. Since big data distribution platforms require appropriate data handling, the book also describes a privacy-preserving data integration protocol and privacy-preserving classification protocol for secure computation. Furthermore, it introduces an anonymization technique and privacy risk evaluation technique. This book also describes the latest related findings in both the living safety and medical fields. In the living safety field, to prevent injuries occurring in everyday life, it is necessary to analyze injury data, find problems, and implement suitable measures. But most cases don’t include enough information for injury prevention because the necessary data is spread across multiple organizations, and data integration is difficult from a security standpoint. This book introduces a system for solving this problem by applying a method for integrating distributed data securely and introduces applications concerning childhood injury at home and school injury. In the medical field, privacy protection and patient consent management are crucial for all research. The book describes a medical test bed for the secure collection and analysis of electronic medical records distributed among various medical institutions. The system promotes big-data analysis of medical data with a cloud infrastructure and includes various security measures developed in our project to avoid privacy violations.
Data protection. --- Security. --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Security --- Secure Date Management --- Privacy Protection --- Big Data Security --- Information Security --- Cyber Security --- Open Access --- Computer security
Choose an application
This book contains the successful invited submissions to a Special Issue of Symmetry on the subject of ""Graph Theory"". Although symmetry has always played an important role in Graph Theory, in recent years, this role has increased significantly in several branches of this field, including but not limited to Gromov hyperbolic graphs, the metric dimension of graphs, domination theory, and topological indices. This Special Issue includes contributions addressing new results on these topics, both from a theoretical and an applied point of view.
Zagreb indices --- domination --- Devaney chaos --- rotationally-symmetric convex polytopes --- topologically mixing --- geometric arithmetic index --- connectivity --- Metric dimension --- atom-bond connectivity ABC index --- distinguishing number --- gear graph --- titanium difluoride --- algorithm --- generalized gear graph --- general Randi? index --- cuprite --- atom bond connectivity index --- binary locating-domination number --- basis --- hypercyclicity --- functigraph --- complete graph --- alpha-boron nanotube --- general randi? index --- geodesics --- inverse degree index --- Hex-Derived Cage networks --- metric dimension --- dominating set --- bipartite graphs --- products of graphs --- geometric-arithmetic GA index --- direct product of graphs --- gromov hyperbolicity --- secure resolving set and secure resolving domination --- topological indices --- graph operators --- resolving set --- harmonic index --- polycyclic aromatic hydrocarbons --- ILP models --- disjointness --- topological transitivity --- Gromov hyperbolicity --- metric basis --- harmonic polynomial
Choose an application
cryptanalysis --- secret-key cryptography --- cryptographic protocols --- secure smart system/device --- digital rights management --- quantum safe cryptography --- Data encryption (Computer science) --- Cryptography --- Cryptography. --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Computer Science --- Engineering sciences. Technology
Choose an application
Biometric identification --- Identification biométrique --- Periodicals --- Périodiques --- EJINGEN EPUB-ALPHA-I EPUB-PER-FT IET-E --- biometrics recognition --- biometric applications --- secure biometric storage --- ethical issues in biometrics --- machine learning --- artificial intelligence --- Biometry --- Biometry. --- Biological statistics --- Biology --- Biometrics (Biology) --- Biostatistics --- Biomathematics --- Statistics --- Statistical methods
Choose an application
This book contains the manuscripts that were accepted for publication in the MDPI Special Topic "Cyber Security and Critical Infrastructure" after a rigorous peer-review process. Authors from academia, government and industry contributed their innovative solutions, consistent with the interdisciplinary nature of cybersecurity. The book contains 16 articles: an editorial explaining current challenges, innovative solutions, real-world experiences including critical infrastructure, 15 original papers that present state-of-the-art innovative solutions to attacks on critical systems, and a review of cloud, edge computing, and fog's security and privacy issues.
cybersecurity --- critical Infrastructures --- privacy preservation --- risk management --- big data --- Internet of Things --- blockchain --- cyber threats --- cyber security and privacy policy --- hybrid war --- cybercrime --- COVID-19 pandemic --- coronavirus --- smart grids --- cyber security modeling and simulation --- cyber–physical systems --- industrial control systems --- network security and protocols --- cyber threat intelligence --- resiliency and security of cyber systems --- hardware security solutions --- intrusion detection --- secure communication protocols --- malware analysis --- attribution of cyber attacks --- simulation and test beds for security evaluation of critical infrastructures
Choose an application
This Special Issue is a book composed by collecting documents published through peer review on the research of various advanced technologies related to applications and theories of signal processing for multimedia systems using ML or advanced methods. Multimedia signals include image, video, audio, character recognition and optimization of communication channels for networks. The specific contents included in this book are data hiding, encryption, object detection, image classification, and character recognition. Academics and colleagues who are interested in these topics will find it interesting to read.
Technology: general issues --- History of engineering & technology --- data hiding --- AMBTC --- BTC --- Hamming code --- LSB --- predicate encryption --- inner product encryption --- constant-size private key --- efficient decryption --- constant pairing computations --- watermarking --- self-embedding --- digital signature --- fragile watermarking --- constrained backtracking matching pursuit --- sparse reconstruction --- compressed sensing --- greedy pursuit algorithm --- image processing --- visual surveillance --- deep learning --- object detection --- latency optimization --- mobile edge cloud --- connected autonomous cars --- smart city --- video surveillance --- physical layer security --- secure transmission --- secrecy capacity --- secrecy capacity optimization artificial noise --- power allocation --- channel estimation error --- neural network --- transfer learning --- scalograms --- MFCC --- Log-mel --- pre-trained models --- seismic patch classification --- CNN-features --- data complexity --- handwritten text recognition --- Residual Network --- Transformer model --- named entity recognition --- n/a
Choose an application
This book presents a compendium of the 10 articles published in the recent Special Issue “Distance and Domination in Graphs”. The works appearing herein deal with several topics on graph theory that relate to the metric and dominating properties of graphs. The topics of the gathered publications deal with some new open lines of investigations that cover not only graphs, but also digraphs. Different variations in dominating sets or resolving sets are appearing, and a review on some networks’ curvatures is also present.
independent domination --- stable graph --- tree --- unicyclic graph --- graph --- automorphism group --- determining number --- cograph --- unit interval graph --- simultaneous strong resolving set --- simultaneous strong metric dimension --- simultaneous strong resolving graph --- total outer k-independent domination --- total domination --- k-independence --- total Roman domination --- Roman domination --- semitotal domination --- domination --- efficient open domination --- digraphs --- products of digraphs --- secure total domination --- rooted product graph --- Roman domination number --- perfect Roman domination number --- strong resolving graph --- strong metric dimension --- strong resolving set --- cactus graphs --- unicyclic graphs --- network science --- network curvature --- discrete Ricci curvature --- earth-mover’s distance
Choose an application
Computing and communication capabilities are increasingly embedded in diverse objects and structures in the physical environment. They will link the ‘cyberworld’ of computing and communications with the physical world. These applications are called cyber physical systems (CPS). Obviously, the increased involvement of real-world entities leads to a greater demand for trustworthy systems. Hence, we use "system trustworthiness" here, which can guarantee continuous service in the presence of internal errors or external attacks. Mobile CPS (MCPS) is a prominent subcategory of CPS in which the physical component has no permanent location. Mobile Internet devices already provide ubiquitous platforms for building novel MCPS applications. The objective of this Special Issue is to contribute to research in modern/future trustworthy MCPS, including design, modeling, simulation, dependability, and so on. It is imperative to address the issues which are critical to their mobility, report significant advances in the underlying science, and discuss the challenges of development and implementation in various applications of MCPS.
AUTOSAR --- DAG --- runnable scheduling --- control-scheduling codesign --- lagrange multiplier --- Mobile Cyber-Physical Systems (MCPS) --- industry --- Mobile Sink Groups (MSG) --- group mobility --- real-time data delivery --- Intelligent Transportation System (ITS) --- deep neural network --- Red Light Runner (RLR) --- dynamic signal control --- intersection safety --- mixed-criticality --- power-aware --- real-time scheduling --- DVFS --- security taxonomies --- event-based systems --- mobile cyber physical systems --- security flaws --- searchable encryption --- PEKS --- forward privacy --- trusted execution environment --- SGX --- data quality --- large-scale --- high-dimensionality --- linear discriminant analysis --- random projection --- bootstrapping --- controller area network bus --- authentication --- authenticity --- resiliency --- sustainability --- formal verification --- model checking --- in-vehicle network --- model compression --- adversarial robustness --- weight pruning --- adversarial training --- distillation --- embedded system --- secure AI --- n/a
Listing 1 - 10 of 20 | << page >> |
Sort by
|