Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
\"uses » \"used (Expand Search), \"useds (Expand Search)
\\"usedds » \\"useddds (Expand Search)
\"useddddddddds » \"usedddddddddds (Expand Search)
\\"use » \\"used (Expand Search)
\"uses » \"used (Expand Search), \"useds (Expand Search)
\\"usedds » \\"useddds (Expand Search)
\"useddddddddds » \"usedddddddddds (Expand Search)
\\"use » \\"used (Expand Search)
-
601
Time‐specific encrypted range query with minimum leakage disclosure
Published 2021-01-01“…Abstract A time‐specific encrypted range query scheme that has the following properties is proposed. (1) The proposed scheme has trapdoor privacy and data privacy so that a semi‐honest cloud is not able to get any useful information from given ciphertexts and given tokens that are used for searching ranges. (2) Unlike most of the other studies which report that the cloud server stores single encrypted keyword/element in the database, in our solution, the cloud server stores encrypted multi‐keywords/ranges in the database. …”
Get full text
Article -
602
A Blockchain-Based Privacy Protection Model Under Quality Consideration in Spatial Crowdsourcing Platforms
Published 2024-01-01“…This innovative model combines the strengths of centralized efficiency and decentralized privacy, and introduces a unique mechanism that significantly enhances privacy protection and ensures data integrity. …”
Get full text
Article -
603
Can human rights law bend mass surveillance?
Published 2014-02-01“…This paper provides a brief introduction to PRISM, continues with an outline of the right to privacy as stipulated in the International Covenant on Civil and Political Rights (ICCPR), the European Convention on Human Rights and the EU Directive on Data Protection, and moves on to discuss whether international human rights law may be used to bend mass surveillance.…”
Get full text
Article -
604
A Comparative Study of Privacy-Preserving Techniques in Federated Learning: A Performance and Security Analysis
Published 2025-03-01“…Federated learning (FL) is a machine learning technique where clients exchange only local model updates with a central server that combines them to create a global model after local training. While FL offers privacy benefits through local training, privacy-preserving strategies are needed since model updates can leak training data information due to various attacks. …”
Get full text
Article -
605
Differential Private POI Queries via Johnson-Lindenstrauss Transform
Published 2018-01-01“…In addition, the proposed perturbation method based on the Johnson Lindenstrauss transform satisfies the differential privacy. Two popular point of interest queries, <inline-formula> <tex-math notation="LaTeX">$k$ </tex-math></inline-formula>-NN and Range, are used to evaluate the method on two real-world data sets. …”
Get full text
Article -
606
A Novel Information Security Framework for Securing Big Data in Healthcare Environment Using Blockchain
Published 2023-12-01“…The framework is based on the principles of confidentiality and immutability to ensure the security and privacy of health care data. The framework is designed to support a wide range of information sources and use cases including patient records, clinical research, medical imaging, genomic data, and pharmaceutical trials. …”
Get full text
Article -
607
A federated LSTM network for load forecasting using multi-source data with homomorphic encryption
Published 2025-03-01“…These challenges drive the adoption of federated learning (FL) to address issues related to data silos and privacy. In this paper, a novel framework for short-term load forecasting was proposed using historical data from industries such as power, meteorology, and finance. …”
Get full text
Article -
608
Analysis of Service Quality in Smart Running Applications Using Big Data Text Mining Techniques
Published 2024-11-01Get full text
Article -
609
Behavioural Economics and Consumer Decision-Making in the Age of Artificial Intelligence (AI), Data Science, Business Analytics, and Internet of Things (IoT)
Published 2024-05-01“…However, while AI and IoT facilitate more efficient and engaging consumer experiences, they introduce complex ethical and practical concerns, particularly around data privacy, algorithmic fairness, and maintenance of consumer trust. …”
Get full text
Article -
610
Predictive Model to Analyse Real and Synthetic Data for Learners' Performance Prediction Using Regression Techniques
Published 2025-03-01“…Real-world data availability is often hampered by privacy concerns, prompting a shift towards synthetic data generation. …”
Get full text
Article -
611
A Novel System for Confidential Medical Data Storage Using Chaskey Encryption and Blockchain Technology
Published 2023-12-01“… Secure storage of confidential medical information is critical to healthcare organizations seeking to protect patient's privacy and comply with regulatory requirements. This paper presents a new scheme for secure storage of medical data using Chaskey cryptography and blockchain technology. …”
Get full text
Article -
612
Secure healthcare data sharing and attack detection framework using radial basis neural network
Published 2025-05-01“…The proposed authenticate access control mechanism (PA2C) safeguards data integrity as well as the security and dependability of EHR data sharing are improved by the use of smart contracts, encryption, and secure key management. …”
Get full text
Article -
613
Face-to-Face Interactions Estimated Using Mobile Phone Data to Support Contact Tracing Operations
Published 2024-12-01Get full text
Article -
614
Respiratory Rate Estimation from Thermal Video Data Using Spatio-Temporal Deep Learning
Published 2024-10-01“…Thermal videos provide a privacy-preserving yet information-rich data source for remote health monitoring, especially for respiration rate (RR) estimation. …”
Get full text
Article -
615
-
616
Comments on “Exploring Secure V2X Communication Networks for Human-Centric Security and Privacy in Smart Cities”—Privacy-Preserving Certificate in V2X Communic...
Published 2025-01-01“…The proposed framework validates vehicle legitimacy using individual certificates and subsequently transmits data collected and integrated by intermediate entities to the blockchain, thereby avoiding direct exposure of vehicle privacy. …”
Get full text
Article -
617
Enhanced Fall Detection Using YOLOv7-W6-Pose for Real-Time Elderly Monitoring
Published 2024-12-01“…Furthermore, the approach ensures data privacy by processing only skeletal points derived from pose estimation, with no personal data stored. …”
Get full text
Article -
618
A flexible privacy-preservation approach for IoT-driven smart Hospital employing diverse distribution methods
Published 2025-01-01“…DP Smart Hospital uses Laplace or exponential distributions in differential privacy strategies to protect sensitive data generated by IoT devices. …”
Get full text
Article -
619
Mediating role of trust and privacy concerns between web assurance mechanism and purchase intention of online products
Published 2024-12-01“…A conceptual model has been framed to investigate the direct and indirect relationship between web assurance mechanism and purchase intention of online products via trust and privacy concern. This study uses data collected from 342 respondents. …”
Get full text
Article -
620
Blockchain-enabled efficient distributed attribute-based access control framework with privacy-preserving in IoV
Published 2022-11-01“…Aiming at solving the challenges of the Internet of Vehicles (IoV), such as privacy sensitive data exposing, data being vulnerable to unauthorized access and tampered with and the single point of failure of the cloud server, this paper introduces a blockchain-enabled data access method based on attribute-based encryption. …”
Get full text
Article