Browsing by Subject "privacy"
Now showing items 1-7 of 7
-
(2016-08-30)Standard encryption protocols do not allow for native searching or modification of data, without decryption. In this scenario, whoever is performing the operations on this file must also have the encryption key. Homomorphic ...
-
(2013-08-02)A covert communications network (CCN) is a connected, overlay peer-to-peer network used to support communications within a group in which the survival of the group depends on the confidentiality and anonymity of communications, ...
-
Information Theoretically Secure Enhanced Johnson Noise Based Key Distribution over the Smart Grid (2016-07-25)The imperative need for unconditionally secure key exchange is caused by the increasing connectivity of networks and by the increasing number and level of sophistication of cyberattacks. Two concepts that are information ...
-
Dedicated Short Range Communications (DSRC) is an emerging technology application allowing vehicles to communicate with each other for safety improvements. The current protocol calls for open broadcast of Basic Safety ...
-
(2021-05-19)Roboticists design robots by relying heavily on empirical knowledge and prior experience. That design process is seldom done in an automated fashion. This dissertation aims to automate robot design for robots for estimation ...
-
(2011-10-21)Young women‘s sexual health is declining. Sorority women face an intersectionality of risk for the negative consequences of sexual activity because of college attendance, sex, and age. The influence of peer communication ...
-
(1996)Negligence with regard to the privacy and protection of student records led to the passage of the Family Educational Rights and Privacy Act of 1974. By granting relatively liberal access of the record to the student or ...