Wyniki wyszukiwania dla: PRIVACY - MOST Wiedzy

Wyszukiwarka

Wyniki wyszukiwania dla: PRIVACY

Filtry

wszystkich: 82
wybranych: 45

wyczyść wszystkie filtry


Filtry wybranego katalogu

  • Kategoria

  • Rok

  • Opcje

wyczyść Filtry wybranego katalogu niedostępne

Wyniki wyszukiwania dla: PRIVACY

  • Quantum privacy witness

    Publikacja

    - PHYSICAL REVIEW A - Rok 2012

    While it is usually known that the mean value of a single observable is enough to detect entanglement or its distillability, the counterpart of such an approach in the case of quantum privacy has been missing. Here we develop the concept of a privacy witness, i.e., a single observable that may detect the presence of the secure key even in the case of bound entanglement. Then we develop the notion of secret-key estimation based...

    Pełny tekst do pobrania w portalu

  • Erosion of privacy in computer vision systems

    W pracy przedstawiono problemy, które mogą wystąpić, gdy technologia komputerowego wzroku zostanie zaimplementowana w urządzeniach wykorzystywanych w codziennym życiu. Przeprowadzono także dyskusję socjologicznych konsekwencji stosowania biometrii, automatycznego śledzenia ruchu i interpretacji obrazu. Omówiono też problemy wynikające z połączenia komputerowego wzroku z możliwościami oferowanymi przez Internet.

  • Augmented Reality for Privacy-Sensitive Visual Monitoring

    Publikacja

    - Rok 2014

    The paper presents a method for video anonymization and replacing real human silhouettes with virtual 3D figures rendered on the screen. Video stream is processed to detect and to track objects, whereas anonymization stage employs fast blurring method. Substitute 3D figures are animated accordingly to behavior of detected persons. Their location, movement speed, direction, and person height are taken into account during the animation...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Context sensitive privacy management in a distributed environment

    Artykuł przedstawia mechanizm zarządzania prywatnością stworzony dla systemu rozproszonego z założeniem, że węzły systemu mają ograniczone zasoby (moc procesora, pamięć). Podstawowy pomysł zakłada, że prywatne dane są filtrowane zgodnie z polityką prywatności użytkowników przed ich ujawnieniem innym użytkownikom. Te decyzje są silnie umiejscowione, co ogranicza narzut związany z zarządzaniem prywatnością na węzłach systemu. Sam...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Consumers’ Need of Privacy Protection – Experimental Results

    Publikacja
    • E. Babula
    • U. Mrzygłód
    • A. Poszewiecki

    - Economics & Sociology - Rok 2017

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Visual Data Encryption for Privacy Enhancement in Surveillance Systems

    Publikacja

    In this paper a methodology for employing reversible visual encryption of data is proposed. The developed algorithms are focused on privacy enhancement in distributed surveillance architectures. First, motivation of the study performed and a short review of preexisting methods of privacy enhancement are presented. The algorithmic background, system architecture along with a solution for anonymization of sensitive regions of interest...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Cybersecurity and Privacy in Standards for Smart Grids – a Comprehensive Survey

    Resilient information and communications technologies are a prerequisite for reliable operation of smart grid. In recent years, many standards for the new form of electricity network have been proposed, which results in operators and other smart grid stakeholders having difficulties in finding the documents which can be related to their particular problems. The purpose of this paper is to bring in all smart grid standards that...

    Pełny tekst do pobrania w portalu

  • Unconditional privacy over channels which cannot convey quantum information

    Publikacja
    • K. Horodecki
    • M. Horodecki
    • P. Horodecki
    • D. Leung
    • J. Oppenheim

    - PHYSICAL REVIEW LETTERS - Rok 2008

    Quantum cryptography enables one to verify that the state of the quantum system has not been tampered with and thus one can obtain privacy regardless of the power of the eavesdropper. All previous protocols relied on the ability to faithfully send quantum states or equivalently to share pure entanglement. Here we show this need not be the case-one can obtain verifiable privacy even through some channels which cannot be used to...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Privacy-Preserving, Scalable Blockchain-Based Solution for Monitoring Industrial Infrastructure in the Near Real-Time

    Publikacja

    - Applied Sciences-Basel - Rok 2022

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Privacy-Preserving, Scalable Blockchain-Based Solution for Monitoring Industrial Infrastructure in the Near Real-Time

    This paper proposes an improved monitoring and measuring system dedicated to industrial infrastructure. Our model achieves security of data by incorporating cryptographical methods and near real-time access by the use of virtual tree structure over records. The currently available blockchain networks are not very well adapted to tasks related to the continuous monitoring of the parameters of industrial installations. In the database...

    Pełny tekst do pobrania w portalu

  • Practical Evaluation of Internet Systems' Security Mechanisms

    A proposed Internet systems security layer with context-oriented security mechanisms reduces the risk associated with possible vulnerabilities. A metric of the system trust level is proposed, and then evaluated according to a university Internet system.

    Pełny tekst do pobrania w portalu

  • A METHOD OF TRUST MANAGEMENT IN WIRELESS SENSOR NETWORKS

    The research problem considered in this paper is how to protect wireless sensor networks (WSN) against cyber-threats by applying trust management and how to strengthen network resilience to attacks targeting the trust management mechanism itself. A new method, called WSN Cooperative Trust Management Method (WCT2M), of distributed trust management in multi-layer wireless sensor networks is proposed and its performance is evaluated....

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Practical I-Voting on Stellar Blockchain

    Publikacja

    In this paper, we propose a privacy-preserving i-voting system based on the public Stellar Blockchain network. We argue that the proposed system satisfies all requirements stated for a robust i-voting system including transparency, verifiability, and voter anonymity. The practical architecture of the system abstracts a voter from blockchain technology used underneath. To keep user privacy, we propose a privacy-first protocol that...

    Pełny tekst do pobrania w portalu

  • OCHRONA PRYWATNOŚCI W SYSTEMACH MONITORINGU WIZYJNEGO, PRZEGLĄD OPRACOWANYCH ARCHITEKTUR I ALGORYTMÓW

    Nieustannie rozwijające się technologie informacyjne związane z inteligentnym monitoringiem wizyjnym stwarzają ryzyko niewłaściwego wykorzystywania danych osobowych. W celu zapewnienia prawidłowej ochrony materiału wizyjnego, w ramach projektów realizowanych w Katedrze Systemów Multimedialnych WETI PG, opracowany został szereg architektur i algorytmów, które ułatwiają ochronę danych wrażliwych, takich jak: wizerunki osób, numery...

    Pełny tekst do pobrania w portalu

  • Towards Cognitive and Perceptive Video Systems

    Publikacja
    • T. Akgun
    • C. Attwood
    • A. Cavallaro
    • C. Fabre
    • F. Poiesi
    • P. Szczuko

    - Rok 2014

    In this chapter we cover research and development issues related to smart cameras. We discuss challenges, new technologies and algorithms, applications and the evaluation of today’s technologies. We will cover problems related to software, hardware, communication, embedded and distributed systems, multi-modal sensors, privacy and security. We also discuss future trends and market expectations from the customer’s point of view.

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Experimental Extraction of Secure Correlations from a Noisy Private State

    Publikacja
    • K. Dobek
    • M. Karpiński
    • R. Demkowicz-Dobrzański
    • K. Banaszek
    • P. Horodecki

    - PHYSICAL REVIEW LETTERS - Rok 2011

    We report experimental generation of a noisy entangled four-photon state that exhibits a separation between the secure key contents and distillable entanglement, a hallmark feature of the recently established quantum theory of private states. The privacy analysis, based on the full tomographic reconstruction of the prepared state, is utilized in a proof-of-principle key generation. The inferiority of distillation-based strategies...

    Pełny tekst do pobrania w portalu

  • Experimental generation of complex noisy photonic entanglement

    Publikacja
    • K. Dobek
    • M. Karpiński
    • R. Demkowicz-Dobrzański
    • K. Banaszek
    • P. Horodecki

    - LASER PHYSICS - Rok 2013

    We present an experimental scheme based on spontaneous parametric down-conversion to produce multiple-photon pairs in maximally entangled polarization states using an arrangement of two type-I nonlinear crystals. By introducing correlated polarization noise in the paths of the generated photons we prepare mixed-entangled states whose properties illustrate fundamental results obtained recently in quantum information theory, in particular those...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Multipartite secret key distillation and bound entanglement

    Publikacja

    Recently it has been shown that quantum cryptography beyond pure entanglement distillation is possible and a paradigm for the associated protocols has been established. Here we systematically generalize the whole paradigm to the multipartite scenario. We provide constructions of new classes of multipartite bound entangled states, i.e., those with underlying twisted Greenberger-Horne-Zeilinger (GHZ) structure and nonzero distillable...

    Pełny tekst do pobrania w portalu

  • Antecedents and outcomes of social media fatigue

    Purpose – This study aims to explore which of four chosen factors (i.e. privacy concerns, FoMO, self-disclosure and time cost) induce a feeling of strain among Facebook users in terms of social media fatigue (SMF), and if this occurs, whether it further influences such outcomes as discontinuance of usage (DoU) and interaction engagement decrement (IED). Design/methodology/approach – Through an online structured questionnaire, empirical...

    Pełny tekst do pobrania w portalu

  • Multimedia Communications, Services and Security MCSS. 10th International Conference, MCSS 2020, Preface

    Publikacja

    - Rok 2020

    Multimedia surrounds us everywhere. It is estimated that only a part of the recorded resources are processed and analyzed. These resources offer enormous opportunities to improve the quality of life of citizens. As a result, of the introduction of a new type of algorithms to improve security by maintaining a high level of privacy protection. Among the many articles, there are examples of solutions for improving the operation of...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Analiza danych osobowych przetwarzanych w systemach telekomunikacyjnych klasy IP PBX oraz metod ich anonimizacji za pomocą systemów SBC

    Publikacja

    Opisano wyniki realizacji pracy, dotyczącej analizy systemu telekomunikacyjnego, opartego na technologii VoIP, pod względem wymagań prawnych powstałych wraz z wejściem w życie przepisów Ogólnego Rozporządzenia o Ochronie Danych Osobowych (RODO). Przedstawiono wyniki analizy przykładowego systemu IP PBX Asterisk oraz wykorzystywanego w nim protokołu sygnalizacyjnego SIP, w kontekście przetwarzania danych osobowych, a także metody...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • The Innovative Faculty for Innovative Technologies

    A leaflet describing Faculty of Electronics, Telecommunications and Informatics, Gdańsk University of Technology. Multimedia Systems Department described laboratories and prototypes of: Auditory-visual attention stimulator, Automatic video event detection, Object re-identification application for multi-camera surveillance systems, Object Tracking and Automatic Master-Slave PTZ Camera Positioning System, Passive Acoustic Radar,...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • A survey of neural networks usage for intrusion detection systems

    In recent years, advancements in the field of the artificial intelligence (AI) gained a huge momentum due to the worldwide appliance of this technology by the industry. One of the crucial areas of AI are neural networks (NN), which enable commer‐ cial utilization of functionalities previously not accessible by usage of computers. Intrusion detection system (IDS) presents one of the domains in which neural networks are widely tested...

    Pełny tekst do pobrania w portalu

  • Trustworthy Applications of ML Algorithms in Medicine - Discussion and Preliminary Results for a Problem of Small Vessels Disease Diagnosis.

    Publikacja

    - Rok 2022

    ML algorithms are very effective tools for medical data analyzing, especially at image recognition. Although they cannot be considered as a stand-alone diagnostic tool, because it is a black-box, it can certainly be a medical support that minimize negative effect of human-factors. In high-risk domains, not only the correct diagnosis is important, but also the reasoning behind it. Therefore, it is important to focus on trustworthiness...

    Pełny tekst do pobrania w portalu

  • A Review of Traffic Analysis Attacks and Countermeasures in Mobile Agents' Networks

    Publikacja

    - Rok 2021

    For traditional, message-based communication, traffic analysis has been already studied for over three decades and during that time various attacks have been recognised. As far as mobile agents’ networks are concerned only a few, specific-scope studies have been conducted. This leaves a gap that needs to be addressed as nowadays, in the era of Big Data, the Internet of Things, Smart Infrastructures and growing concerns for privacy,...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Federated Learning in Healthcare Industry: Mammography Case Study

    The paper focuses on the role of federated learning in a healthcare environment. The experimental setup involved different healthcare providers, each with their datasets. A comparison was made between training a deep learning model using traditional methods, where all the data is stored in one place, and using federated learning, where the data is distributed among the workers. The experiment aimed to identify possible challenges...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • A framework of open government data (OGD) e-service quality dimensions with future research agenda

    Publikacja
    • C. H. Alexopoulos
    • S. Saxena
    • N. Rizun
    • S. Deo

    - Records Management Journal - Rok 2023

    Purpose This research paper aims to present a framework of open government data (OGD) relating to e-service quality dimensions. In addition, it provides a research agenda for the e-service delivery of OGD. Design/methodology/approach A literature review pertaining to e-service quality with special reference to e-government was delivered to deduce the key dimensions of e-service quality for OGD. Findings Five e-service quality dimensions...

    Pełny tekst do pobrania w portalu

  • Value co‐creation (VCC) and value co‐destruction (VCD) via open government data (OGD): Empirical case of Tanzania

    Publikacja
    • F. Ishengoma
    • D. Shao
    • R. G. da Silva
    • G. C. Wiedenhoft
    • C. H. Alexopoulos
    • N. Rizun
    • S. Saxena

    - Electronic Journal of Information Systems in Developing Countries - Rok 2024

    Having emphasized upon the potential benefits of Open Government Data (OGD) initiatives via value derivation and innovation pursuits of the stakeholders, it falls in place to complement this line of OGD research in the specific case of Tanzania, a developing country, to support the inferences. Specifically, it is important to understand the manner in which OGD VCC-one of the hinges of OGD initiatives- and OGD VCD-a possible fall...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Speaker Recognition Using Convolutional Neural Network with Minimal Training Data for Smart Home Solutions

    Publikacja

    - Rok 2018

    With the technology advancements in smart home sector, voice control and automation are key components that can make a real difference in people's lives. The voice recognition technology market continues to involve rapidly as almost all smart home devices are providing speaker recognition capability today. However, most of them provide cloud-based solutions or use very deep Neural Networks for speaker recognition task, which are...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Digital Public Service Innovation: Framework Proposal

    Publikacja

    - Rok 2016

    This paper proposes the Digital Public Service Innovation Framework that extends the "standard" provision of digital public services according to the emerging, enhanced, transactional and connected stages underpinning the United Nations Global e-Government Survey, with seven example "innovations" in digital public service delivery -- transparent, participatory, anticipatory, personalized, co-created, context-aware and context-smart....

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Deep learning in the fog

    In the era of a ubiquitous Internet of Things and fast artificial intelligence advance, especially thanks to deep learning networks and hardware acceleration, we face rapid growth of highly decentralized and intelligent solutions that offer functionality of data processing closer to the end user. Internet of Things usually produces a huge amount of data that to be effectively analyzed, especially with neural networks, demands high...

    Pełny tekst do pobrania w portalu

  • Borders of Digital Art in the Context of the Information Society

    Publikacja

    The article shows the relationship between the development of information technologies, the characteristics of the information society and digital art. The broad possibilities of the digital world related to recording, storing and processing data (cyber text, big data, smart services) and the creation of virtual worlds are pointed out. The influence of the development of information technologies on the character of the works of...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Optimizing Medical Personnel Speech Recognition Models Using Speech Synthesis and Reinforcement Learning

    Text-to-Speech synthesis (TTS) can be used to generate training data for building Automatic Speech Recognition models (ASR). Access to medical speech data is because it is sensitive data that is difficult to obtain for privacy reasons; TTS can help expand the data set. Speech can be synthesized by mimicking different accents, dialects, and speaking styles that may occur in a medical language. Reinforcement Learning (RL), in the...

    Pełny tekst do pobrania w portalu

  • Detection of People Swimming in Water Reservoirs with the Use of Multimodal Imaging and Machine Learning

    Publikacja

    - Rok 2024

    Every year in many countries, there are fatal unintentional drownings in different water reservoirs like swimming pools, lakes, seas, or oceans. The existing threats of this type require creating a method that could automatically supervise such places to increase the safety of bathers. This work aimed to create methods and prototype solutions for detecting people bathing in water reservoirs using a multimodal imaging system and...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Digital Innovations and Smart Solutions for Society And Economy: Pros and Cons

    Publikacja

    Recent developments in artificial intelligence (AI) may involve significant potential threats to personal data privacy, national security, and social and economic stability. AI-based solutions are often promoted as “intelligent” or “smart” because they are autonomous in optimizing various processes. Be-cause they can modify their behavior without human supervision by analyzing data from the environ-ment, AI-based systems may be...

    Pełny tekst do pobrania w portalu

  • Preferred Benchmarking Criteria for Systematic Taxonomy of Embedded Platforms (STEP) in Human System Interaction Systems

    Publikacja
    • A. Kwaśniewska
    • S. Raghava
    • C. Davila
    • M. Sevenier
    • D. Gamba
    • J. Rumiński

    - Rok 2022

    The rate of progress in the field of Artificial Intelligence (AI) and Machine Learning (ML) has significantly increased over the past ten years and continues to accelerate. Since then, AI has made the leap from research case studies to real production ready applications. The significance of this growth cannot be undermined as it catalyzed the very nature of computing. Conventional platforms struggle to achieve greater performance...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Fully Automated AI-powered Contactless Cough Detection based on Pixel Value Dynamics Occurring within Facial Regions

    Publikacja

    - Rok 2021

    Increased interest in non-contact evaluation of the health state has led to higher expectations for delivering automated and reliable solutions that can be conveniently used during daily activities. Although some solutions for cough detection exist, they suffer from a series of limitations. Some of them rely on gesture or body pose recognition, which might not be possible in cases of occlusions, closer camera distances or impediments...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Zastosowanie szablonów Trust Case w pracy z normą BS 7799

    Publikacja

    - Rok 2006

    Trust Case stanowi strukturę danych zawierającą argumentację oraz związany z nią materiał dowodowy uzasadniający, że interesujący nas obiekt (system, infrastruktura, organizacja) posiada wskazane własności. Wykorzystanie Trust Case do analizy i uzasadniania zaufania do systemów IT jest przedmiotem aktywnych badań. Podejście to znalazło zastosowanie w stosunku do systemów związanych z bezpieczeństwem (ang. safety critical), a ostatnio...

  • Towards Scalable Simulation of Federated Learning

    Federated learning (FL) allows to train models on decentralized data while maintaining data privacy, which unlocks the availability of large and diverse datasets for many practical applications. The ongoing development of aggregation algorithms, distribution architectures and software implementations aims for enabling federated setups employing thousands of distributed devices, selected from millions. Since the availability of...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Automatic recognition of males and females among web browser users based on behavioural patterns of peripherals usage

    Publikacja

    - Internet Research - Rok 2016

    Purpose The purpose of this paper is to answer the question whether it is possible to recognise the gender of a web browser user on the basis of keystroke dynamics and mouse movements. Design/methodology/approach An experiment was organised in order to track mouse and keyboard usage using a special web browser plug-in. After collecting the data, a number of parameters describing the users’ keystrokes, mouse movements and clicks...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Framework for Integration Decentralized and Untrusted Multi-vendor IoMT Environments

    Publikacja

    - IEEE Access - Rok 2020

    Lack of standardization is highly visible while we use historical data sets or compare our model with others that use IoMT devices from different vendors. The problem also concerns the trust in highly decentralized and anonymous environments where sensitive data are transferred through the Internet and then are analyzed by third-party companies. In our research we propose a standard that has been implemented in the form of framework...

    Pełny tekst do pobrania w portalu

  • Attitudes of oncology patients’ towards biospecimen donation for biobank research

    Publikacja

    - BMC CANCER - Rok 2024

    Background Since the biological material that remains after diagnostic and therapeutic procedures plays crucial role in biobank research, this study aims to explore cancer patients’ views on the donation of biospecimens for research purposes. Methods 548 oncology patients from two hospitals with oncology treatment units in Poznan, Poland,...

    Pełny tekst do pobrania w portalu

  • Usability of Mobile Applications: A Consolidated Model

    Publikacja

    - IEEE Access - Rok 2024

    Mobile devices have become an integral part of the digital ecosystem, connecting people, businesses, and information around the world in ways never before possible. In particular, smartphones, tablets and other handheld devices equipped with mobile applications have changed every aspect of our lives. Today, a user can choose from nearly five million applications available for both Android and iOS operating systems. However, only...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Literature review of user needs, toward user requirements

    Publikacja

    - Rok 2020

    This report has been developed in the frame of the IEA SHC Task 61 Subtask A “User requirements”. The main objective was to rethink and reformulate user requirements to lighting (daylighting and electric lighting) in public buildings on the basis of a thorough literature study. The work is a joint effort of a number of scientists and represents collective knowledge in this topic. The concept of Lighting quality is the one, among...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Activity-based payments: alternative (anonymous) online payment model

    Electronic payments are the cornerstone of web-based commerce. A steady decrease in cash usage has been observed, while various digital payment technologies are taking over. They process sensitive personal information raising concerns about its potentially illicit usage. Several payment models that confront this challenge have been proposed. They offer varying levels of anonymity and readiness for adoption. The aim of this study...

    Pełny tekst do pobrania w serwisie zewnętrznym