Search alternatives:
\\"usedds » \\"useddds (Expand Search)
\"useddddds » \"usedddddds (Expand Search)
\\"use » \\"used (Expand Search)
Showing 1,461 - 1,480 results of 2,784 for search '"\"((((\\"usedds OR \"useddddds) OR \"useddddds) privacy data\\") OR (\\"use privacy data\\"))\""', query time: 0.13s Refine Results
  1. 1461

    Hierarchical Service Composition via Blockchain-enabled Federated Learning by Li Huang, Lu Zhao, Yansong Liu, Yao Zhao

    Published 2024-08-01
    “…The first selection layer enables each CSP to efficiently select services using a pre-trained model, while the second selection layer employs a blockchain-based QoS-aware mechanism for the final composition result, addressing privacy concerns. …”
    Get full text
    Article
  2. 1462

    Advancement in public health through machine learning: a narrative review of opportunities and ethical considerations by Sumit Singh Dhanda, Deepak Panwar, Chia-Chen Lin, Tarun Kumar Sharma, Deependra Rastogi, Shantanu Bindewari, Anand Singh, Yung-Hui Li, Neha Agarwal, Saurabh Agarwal

    Published 2025-07-01
    “…Ethically, this review surfaces critical issues, including algorithmic bias, data privacy concerns in mental health analytics, and the interpretability of black-box models used in outbreak surveillance. …”
    Get full text
    Article
  3. 1463

    Confidential Intelligent Traffic Light Control System: Prevention of Unauthorized Traceability by Ahmad Audat, Maram Bani Younes, Marah Yahia, Said Ghoul

    Published 2025-06-01
    “…However, the accuracy of gathered traffic data at each road intersection affects its performance. …”
    Get full text
    Article
  4. 1464

    Integrating blockchain technology for secure access control in smart home environments: A comprehensive review by Tariq Bishtawi, Mohammad Shehab, Reem Alzubi, Ayman Ghaben, Suaad M. Alenzi

    Published 2025-01-01
    “…The decentralized and tamper-resistant nature of blockchain technology effectively solves important problems, including device authentication, data integrity, and access management, through the use of cryptography and distributed ledgers. …”
    Get full text
    Article
  5. 1465

    SAFERIDES: Application of decentralized control edge-computing to ridesharing monitoring services by Samaa Elnagar, Kweku Muata Osei Bryson, Manoj Thomas

    Published 2024-11-01
    “…The model also limits data transfer to the edge to avoid security and privacy risks. …”
    Get full text
    Article
  6. 1466

    Digital Technologies and Trade Facilitation in Ethiopia: A Mixed-Methods Analysis of Blockchain, AI, and IoT Adoption by Chekole Sete Demeke

    Published 2025-06-01
    “…Specifically, survey data revealed that only 10% of firms currently use AI, despite 67% recognizing its value for fraud detection. …”
    Get full text
    Article
  7. 1467
  8. 1468
  9. 1469
  10. 1470
  11. 1471

    Patient and wearable device authentication utilizing attribute-based credentials and permissioned blockchains in smart homes by Solomon Hopewell Kembo, Patience Mpofu, Saulo Jacques, Nevil Chitiyo, Brighton Mukorera

    Published 2023-06-01
    “…The sensitive nature of health data requires safeguards to ensure patients’ privacy is not violated. …”
    Get full text
    Article
  12. 1472

    An anonymous authentication protocol for vehicle to grid based on elliptic curve cryptography by Zeyu Sun, Yan Wang

    Published 2025-08-01
    “…Once these data are leaked, the privacy and security of users will be threatened. …”
    Get full text
    Article
  13. 1473

    The Impact of Operating System on Bandwidth in Open VPN Technology by Baghdad Science Journal

    Published 2016-03-01
    “…The internet is a basic source of information for many specialities and uses. Such information includes sensitive data whose retrieval has been one of the basic functions of the internet. …”
    Get full text
    Article
  14. 1474

    Machine Learning in Ambient Assisted Living for Enhanced Elderly Healthcare: A Systematic Literature Review by Aabid A. Mir, Ahmad S. Khalid, Shahrulniza Musa, Mohammad Faizal Ahmad Fauzi, Normy Norfiza Abdul Razak, Tong Boon Tang

    Published 2025-01-01
    “…Issues around data privacy, security breaches, and the need for robust privacy-preserving mechanisms are recurrent themes. …”
    Get full text
    Article
  15. 1475

    Implementasi Teknologi Blockchain dalam Digital Marketing by Achmad Solechan, Rohmad Abidin

    Published 2024-12-01
    “…Some respondents were concerned about their privacy on the use of digital marketing, especially the abuse of their privacy related to user data. …”
    Get full text
    Article
  16. 1476

    A New Framework for Enhancing VANETs through Layer 2 DLT Architectures with Multiparty Threshold Key Management and PETs by Haitham Y. Adarbah, Mehmet Sabir Kiraz, Suleyman Kardas, Ali H. Al-Bayatti, Hilal M. Y. Al-Bayatti

    Published 2024-09-01
    “…This transition applies a decentralized ledger mechanism to ensure correctness, reliability, accuracy, and security against various known attacks. The use of Layer 2 DLTs in our framework enhances key management, trust distribution, and data privacy, offering cost and speed advantages over Layer 1 DLTs, thereby enabling secure vehicle-to-everything (V2X) communication. …”
    Get full text
    Article
  17. 1477

    تطبیقات الهواتف الذکیة والخصوصیة المعلوماتیة : دراسة تحلیلیة مقارنة by د. حسام الدین محمد رفعت

    Published 2020-09-01
    “…In recent years there has been alegislative response at different levels for the sake of this protection, and thejudiciary has followed it with a remarkable response in favour of the jurisprudenceof the private life of individuals that is of paramount importance to both theindividual and the community.This coincided with the increasing vulnerability of the right to privacy tothe digital environment through e-mail and chat sites Networks or communicationsites, which have become a hoot of the modern era and a wide electronic space,in which we put all the references about us and our lives, as well as our privacy.The purpose of this study is to diagnose the reality of the work of Google Playapplications that work on the smart phone environment, especially with regard togathering information or allowing access to personal data and users’ information,by identifying the nature of data and information collected or allowed access to,monitoring the nature of the risks of using these applications.To do so, the researcher studied and analyzed licensing agreements forthe use of 80 applications of smart phones in areas commonly used in the digitalenvironment, such as social networking applications, Online banks Applications,antivirus applications, web search applications, news and press applications,educational applications, web applications, travel and tourism applications. …”
    Get full text
    Article
  18. 1478

    Towards digital health: Integrating federated learning and crowdsensing through the Contigo app by Daniel Flores-Martin, Sergio Laso, Javier Berrocal, Juan M. Murillo

    Published 2024-12-01
    “…This digitization supposes a challenge from the point of view of privacy and the treatment of sensitive personal data while providing non-intrusive and easy-to-use digital mechanisms. …”
    Get full text
    Article
  19. 1479

    Facebook as a Digital Public Sphere: Processes of Colonization and Emancipation by Bjarki Valtysson

    Published 2012-01-01
    “…The analysis focuses on Facebook’s communicative-structural contexts, in particular from the viewpoint of user terms, user manoeuvre, privacy/data use policy, and ownership and use of uploaded material. …”
    Get full text
    Article
  20. 1480

    cellKey - An R Package to Perturb Statistical Tables by Bernhard Meindl

    Published 2025-05-01
    “… National statistical offices (NSIs) routinely publish aggregated data in the form of statistical tables. However, ensuring data privacy is a critical aspect of this process. …”
    Get full text
    Article