Search alternatives:
\\"usedds » \\"useddds (Expand Search)
\"useddddds » \"usedddddds (Expand Search)
\"useddddddds » \"usedddddddds (Expand Search)
\\"use » \\"used (Expand Search)
Showing 781 - 800 results of 2,784 for search '"\"((((\\"usedds OR \"useddddds) OR \"useddddddds) privacy data\\") OR (\\"use privacy data\\"))\""', query time: 0.19s Refine Results
  1. 781
  2. 782

    GraphXplore: Visual exploration and accessible preprocessing of medical data by Louis Bellmann, Karl Gottfried, Philipp Breitfeld, Frank Ückert

    Published 2025-02-01
    “…Additionally, metadata sharing, and reproducible dataset preparation are needed to increase data quality and interoperability of privacy-sensitive patient data. …”
    Get full text
    Article
  3. 783

    Mannaging medical records with blockchain by Paulo Caetano da Silva, Reginalda Santos Silva, Daniel José Diaz

    Published 2025-07-01
    “…Therefore, the goal of this work is to evaluate, through a systematic literature review (SLR), the use of blockchain to guarantee data privacy and security in e-Health systems. …”
    Get full text
    Article
  4. 784

    Deep Learning-Based Real Time Human Detection System Using LiDAR Data for Smart Healthcare Monitoring by Kalashtari Niloofar, Huhs Niklas, Kraitl Jens, Hornberger Christoph, Simanski Olaf

    Published 2024-12-01
    “…By training a YOLOv5 deep learning model using transfer learning, a method for accurate human detection and tracking within rooms using data collected from a digital LiDAR sensor was used. …”
    Get full text
    Article
  5. 785

    A secure and efficient public auditing system of cloud storage based on BLS signature and automatic blocker protocol by Baidaa Abdulrahman Jalil, Taha Mohammed Hasan, Ghassan Sabeeh Mahmood, Hazim Noman Abed

    Published 2022-07-01
    “…Hence, public cloud storage auditing is critical, so users can use a Third-party auditor (TPA) to verify data integrity. …”
    Get full text
    Article
  6. 786

    Security, QoS and energy aware optimization of cloud-edge data centers using game theory and homomorphic encryption: Modeling and formal verification by Mbarek Marwan, Abdelkarim Ait Temghart, Said Ouhmi, Mohamed Lazaar

    Published 2024-12-01
    “…First of all, we develop a secure offloading technique that can process data while preserving privacy. Although RSA and Paillier cryptosystems are highly beneficial for mathematical operations on basic encrypted data due to their homomorphic properties, images are processed using permutation-ordered binary (POB) and Shamir's secret sharing (SSS). …”
    Get full text
    Article
  7. 787

    Edge Computing and Cloud Computing for Internet of Things: A Review by Francesco Cosimo Andriulo, Marco Fiore, Marina Mongiello, Emanuele Traversa, Vera Zizzo

    Published 2024-09-01
    “…These hybrid models optimize bandwidth use and support low-latency, privacy-sensitive applications in IoT ecosystems. …”
    Get full text
    Article
  8. 788

    Patient Confidentiality of Electronic Health Records: A Recent Review of the Saudi Literature by Nada Saddig Almaghrabi, Bussma Ahmed Bugis

    Published 2022-07-01
    “…Background Health systems harbor lucrative data that can be targeted for illegal access, thus posing a serious privacy breach. …”
    Get full text
    Article
  9. 789

    Modelling Users` Trust in Online Social Networks by Iacob Cătoiu, Mihai Orzan, Octav-Ionuţ Macovei, Claudia Iconaru

    Published 2014-02-01
    “…We have adapted metrics for the purpose of our study and we have assessed their reliability and validity. We use a Partial Least Squares (PLS) based structural equation modelling analysis, which validated all our initial assumptions, indicating that our three predictors (privacy concerns, perceived benefits and perceived risks) explain 48% of the variation of users’ trust in online social networks, the resulting variable of our study. …”
    Get full text
    Article
  10. 790

    Security and Market Liquidity Enhanced Transactive Energy System for Residential End Users by Vanga Anil, S. L. Arun

    Published 2025-01-01
    “…Security concerns include data integrity, authentication, confidentiality, scalability, and privacy, while economic challenges involve penalty reduction and market liquidity. …”
    Get full text
    Article
  11. 791

    Determinants of Childbirth Choice in Rural Senegal: Mixed-Methods Analysis Using Data from the Niakhar Demographic Surveillance System by Pape Latyr Faye

    Published 2025-06-01
    “…Materials and methods: The study used a mixed-methods approach. Data from women who gave birth in the Niakhar observatory area between 1983 and 2020 were used, and chi-square tests and qualitative analyses were performed. …”
    Get full text
    Article
  12. 792

    Unveiling Digital Wallets Adoption in Developing countries: A Dual-Factor Approach of Enablers and Inhibitors Impacting User Intentions by Doaa Rasheed, Mohammed Alsalem, Odai Enaizan

    Published 2025-06-01
    “…Structural Equation Modeling (SEM) was employed for data analysis using AMOS software. The findings indicate that performance expectancy, effort expectancy, social influence, perceived privacy, perceived security, and trust all have a significant impact on the intention regarding the adoption of digital wallets.…”
    Get full text
    Article
  13. 793

    Attribute-based encryption schema with group signatures by Xinglan ZHANG, Yao CUI

    Published 2019-02-01
    “…Cipher text-policy attribute-based encryption schema(CP-ABE) is widely used in protection of sensitive data.In CP-ABE,When the users access the cipher text,the access structure and the cipher text were sent to the users.However,the access structure is also has private information which can lead to leak of the privacy.The group signatures were used in CP-ABE to realize protection of the privacy.What’s more,it can satisfy indistinguishable under the choice of plaintext attack.…”
    Get full text
    Article
  14. 794

    Towards Secure FinTech: A Survey, Taxonomy, and Open Research Challenges by Sobia Mehrban, Muhammad Waqas Nadeem, Muzammil Hussain, Mohammad Masroor Ahmed, Owais Hakeem, Shazia Saqib, M. L. Mat Kiah, Fakhar Abbas, Mujtaba Hassan, Muhammad Adnan Khan

    Published 2020-01-01
    “…The term does take into account various other sensitive issues, like, security, privacy, threats, cyber-attacks, etc. This is important to note that the development of FinTech is indebted to the mutual integration of different state of the art technologies, for example, technologies related to a mobile embedded system, mobile networks, mobile cloud computing, big data, data analytics techniques, and cloud computing etc. …”
    Get full text
    Article
  15. 795

    Explanations of news personalisation across countries and media types by Mariella Bastian, Mykola Makhortykh, Jaron Harambam, Max van Drunen

    Published 2020-10-01
    “…Yet, the technical implementation of news personalisation systems, in particular the one relying on algorithmic news recommenders (ANRs) and tailoring individual news suggestions with the help of user data, often remains opaque. In our article, we examine how news personalisation is used by quality and popular media in three countries with different media accountability infrastructures - Brazil, the Netherlands, and Russia - and investigate how information about personalisation usage is communicated to the news readers via privacy policies. …”
    Get full text
    Article
  16. 796

    FedDBO: A Novel Federated Learning Approach for Communication Cost and Data Heterogeneity Using Dung Beetle Optimizer by Dongyan Wang, Limin Chen, Xiaotong Lu, Yidi Wang, Yue Shen, Jingjing Xu

    Published 2024-01-01
    “…As an emerging distributed machine learning technology, federated learning has gained widespread attention due to its critical privacy protection mechanism. However, it also faces challenges such as high communication costs and heterogeneous client data.In order to address the above issues. …”
    Get full text
    Article
  17. 797

    User consultation and the design of healing architecture in a cardiology department – ways to improve care for and well-being of patients and their relatives by Maja Forum Riisbøl, Connie Timmermann

    Published 2020-01-01
    “…Design: A mixed-method approach was used, based on user consultation, in order to inform the redecoration and redesign of the observation room. …”
    Get full text
    Article
  18. 798

    A Zero-Knowledge Proof-Enabled Blockchain-Based Academic Record Verification System by Juan Alamrio Berrios Moya, John Ayoade, Md Ashraf Uddin

    Published 2025-05-01
    “…We have used dual-blockchain, which separates public and private information, which can enhance both efficiency and privacy. …”
    Get full text
    Article
  19. 799

    Comparative Analysis of RAG-Based Open-Source LLMs for Indonesian Banking Customer Service Optimization Using Simulated Data by Hendra Lijaya, Patricia Ho, Handri Santoso

    Published 2025-07-01
    “…These findings underscore the potential of locally operated open-source LLMs for banking applications, ensuring privacy and regulatory compliance. However, limitations include reliance on synthetic data, a narrow question set, and lack of user diversity. …”
    Get full text
    Article
  20. 800

    A survey on membership inference attacks and defenses in machine learning by Jun Niu, Peng Liu, Xiaoyan Zhu, Kuo Shen, Yuecong Wang, Haotian Chi, Yulong Shen, Xiaohong Jiang, Jianfeng Ma, Yuqing Zhang

    Published 2024-09-01
    “…Membership inference (MI) attacks mainly aim to infer whether a data record was used to train a target model or not. …”
    Get full text
    Article