Search alternatives:
\\"useddds » \\"usedddds (Expand Search)
\"usedddddddds » \"useddddddddds (Expand Search)
\"useddds » \"usedddds (Expand Search)
\\"use » \\"used (Expand Search)
Showing 761 - 780 results of 2,784 for search '"\"((((\\"useddds OR \"usedddddddds) OR \"useddds) privacy data\\") OR (\\"use privacy data\\"))\""', query time: 0.17s Refine Results
  1. 761

    Edge Computing Oriented Certificateless Sorting Ciphertext Retrieval Scheme by DUAN Jie, GU Wei, ZHANG Shujuan, GONG Xin

    Published 2025-05-01
    “…[Purposes] In order to ensure the privacy and retrievability of cloud data, ciphertext retrieval technology has emerged. …”
    Get full text
    Article
  2. 762

    Ethical Challenges in Blood Donation from Viewpoint of Blood Transfusion Policymakers, Experts and Stakeholders: A Qualitative Study by forouzan akrami, Abolfazl Asghari, tooran mohammadi, abbas sedaghat

    Published 2025-01-01
    “…Purposeful sampling and focus group discussion were used to collect data. Data analysis was performed by Graneheim and Lundman inductive content analysis. …”
    Get full text
    Article
  3. 763

    Factors influencing the perceived usability of line pay: An extended technology acceptance model approach by Yogi Tri Prasetyo, Krisna Chandra Susanto, Ko-Hui Chuang, Ruo-Ting Yin, Jia-Wei Chen, Yu-Xuan Zhang, Omar Paolo Benito, Zachariah John A. Belmonte, Maela Madel L. Cahigas, Reny Nadlifatin, Ma. Janice J. Gumasing

    Published 2025-05-01
    “…Utilizing an extended Technology Acceptance Model (TAM), the research integrated additional variables such as social influence, trust, security, and environmental concerns, offering a comprehensive framework to understand user adoption dynamics. 120 Taiwanese participants were surveyed by employing the Purposive Sampling Method and data were analyzed using Partial Least Squares Structural Equation Modeling (PLS-SEM). …”
    Get full text
    Article
  4. 764

    Based on model randomization and adaptive defense for federated learning schemes by Gaofeng Yue, Xiaowei Han

    Published 2025-02-01
    “…Abstract Federated Learning (FL) is a privacy-enhancing technique that enables multiple participants to collaboratively train machine learning models without sharing their local data. …”
    Get full text
    Article
  5. 765

    Analyzing the concept of solitude with the spatial syntax technique in the spatial organization of rural homes; case Study: Bushehr province by Farshid Mesbah, Behzad Vasigh, Mostafa Masoudinezhad

    Published 2023-03-01
    “…In the next stage, graph analysis technique was used to extract data from the drawn maps using tools such as connectivity, relationship, step depth, metric depth, and angle of view with the help of Depth Map software for sample analysis. …”
    Get full text
    Article
  6. 766

    Self-monitoring of health - user viewpoints on gathering data using consumer health technologies during leisure time by Nora Weinberger, Martina F. Baumann, Maria Maia

    Published 2025-06-01
    “…It focuses on attitudes toward health data collection, data sharing, privacy concerns, and the use of EEG-supported devices.ResultsFindings reveal a complex landscape of trust and concern. …”
    Get full text
    Article
  7. 767
  8. 768

    Medical data sharing and synthetic clinical data generation – maximizing biomedical resource utilization and minimizing participant re-identification risks by Simeone Marino, Ruth Cassidy, Joseph Nanni, Yuxuan Wang, Yipeng Liu, Mingyi Tang, Yuan Yuan, Toby Chen, Anik Sinha, Balaji Pandian, Ivo D. Dinov, Michael L. Burns

    Published 2025-08-01
    “…This article introduces an end-to-end, titratable pipeline that generates privacy-preserving “digital twin” datasets from complex EHR and wearable-device records (Apple Watch data from 3029 participants) using DataSifter and Synthetic Data Vault (SDV) methods. …”
    Get full text
    Article
  9. 769

    Using big data analytics to improve HIV medical care utilisation in South Carolina: A study protocol by Mohammad Rifat Haider, Bankole Olatosi, Jiajia Zhang, Sharon Weissman, Jianjun Hu, Xiaoming Li

    Published 2019-07-01
    “…The RFA is authorised to collect and merge data from these different sources and to ensure the privacy of all PLWH. …”
    Get full text
    Article
  10. 770

    Cybersecurity and Liability in a Big Data World by Maria Lillà Montagnani, Mirta Antonella Cavallo

    Published 2018-10-01
    “…We conclude by showing that, despite this articulate framework, big data and cloud service providers still leverage on their strong market power to use “contractual shields” and escape liability. …”
    Get full text
    Article
  11. 771

    Enhanced Blockchain-based Key Generation using Butterfly Optimization Algorithm for Efficient Data Sharing in Cloud Computing by P. Anbumani, R. Dhanapal

    Published 2023-03-01
    “…Secondly, the user's privacy may be adequately protected with a secure authentication paradigm that employs ABS to safeguard the user's private data. …”
    Get full text
    Article
  12. 772

    Data Protection in Pre-Tertiary Schools In Ghana by Ephrem Kwaa-Aidoo, Elizabeth Serwaa Baah

    Published 2025-05-01
    “…The study also identifies a lack of coordination, formal guidance, inadequate consent procedures, and fragmented implementation strategies in data protection practices. Furthermore, the use of varied data protection mechanisms by different schools suggests a lack of standardised security protocols, which is likely to result in security gaps. …”
    Get full text
    Article
  13. 773
  14. 774

    Smart Grid IoT Framework for Predicting Energy Consumption Using Federated Learning Homomorphic Encryption by Filip Jerkovic, Nurul I. Sarkar, Jahan Ali

    Published 2025-06-01
    “…Homomorphic Encryption (HE) introduces new dimensions of security and privacy within federated learning (FL) and internet of things (IoT) frameworks that allow preservation of user privacy when handling data for FL occurring in Smart Grid (SG) technologies. …”
    Get full text
    Article
  15. 775

    Heterogeneous bioinformatic data encryption on portable devices by Hao Chen, Xiayun Hong, Yao Cheng, Xiaotong Wang, Liyan Chen, Xuan Cheng, Juncong Lin

    Published 2025-04-01
    “…Abstract With the popularity of mobile health monitoring and genome sequencing techniques, the scale of biomedical and genomic data grow rapidly, with their privacy receiving more and more concerns. …”
    Get full text
    Article
  16. 776

    Using Large Language Models to Automate Data Extraction From Surgical Pathology Reports: Retrospective Cohort Study by Denise Lee, Akhil Vaid, Kartikeya M Menon, Robert Freeman, David S Matteson, Michael L Marin, Girish N Nadkarni

    Published 2025-04-01
    “…However, the use of LLMs in the health care setting is limited by cost, computing power, and patient privacy concerns. …”
    Get full text
    Article
  17. 777

    Blockchain Technology for Secure Patient Data Sharing by Robert-Stefan CIZMAŞ

    Published 2025-05-01
    “… This paper presents a decentralized healthcare data management system that utilizes blockchain technology to address critical challenges in data security, patient privacy, and interoperability of electronic medical records (EMR). …”
    Get full text
    Article
  18. 778
  19. 779

    An efficient secure predictive demand forecasting system using Ethereum virtual machine by Himani Saraswat, Mahesh Manchanda, Sanjay Jasola

    Published 2024-12-01
    “…The system leverages the Ethereum virtual machine to establish a secure, decentralized, and tamper‐resistant platform for demand prediction while ensuring data integrity and privacy. By utilizing the capabilities of smart contracts and decentralized applications within the Ethereum ecosystem, the proposed system offers an efficient and transparent solution for demand forecasting challenges. …”
    Get full text
    Article
  20. 780