Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
\\"usedds » \\"useddds (Expand Search)
\"useddddds » \"usedddddds (Expand Search)
\\"use » \\"used (Expand Search)
\\"usedds » \\"useddds (Expand Search)
\"useddddds » \"usedddddds (Expand Search)
\\"use » \\"used (Expand Search)
-
1461
Hierarchical Service Composition via Blockchain-enabled Federated Learning
Published 2024-08-01“…The first selection layer enables each CSP to efficiently select services using a pre-trained model, while the second selection layer employs a blockchain-based QoS-aware mechanism for the final composition result, addressing privacy concerns. …”
Get full text
Article -
1462
Advancement in public health through machine learning: a narrative review of opportunities and ethical considerations
Published 2025-07-01“…Ethically, this review surfaces critical issues, including algorithmic bias, data privacy concerns in mental health analytics, and the interpretability of black-box models used in outbreak surveillance. …”
Get full text
Article -
1463
Confidential Intelligent Traffic Light Control System: Prevention of Unauthorized Traceability
Published 2025-06-01“…However, the accuracy of gathered traffic data at each road intersection affects its performance. …”
Get full text
Article -
1464
Integrating blockchain technology for secure access control in smart home environments: A comprehensive review
Published 2025-01-01“…The decentralized and tamper-resistant nature of blockchain technology effectively solves important problems, including device authentication, data integrity, and access management, through the use of cryptography and distributed ledgers. …”
Get full text
Article -
1465
SAFERIDES: Application of decentralized control edge-computing to ridesharing monitoring services
Published 2024-11-01“…The model also limits data transfer to the edge to avoid security and privacy risks. …”
Get full text
Article -
1466
Digital Technologies and Trade Facilitation in Ethiopia: A Mixed-Methods Analysis of Blockchain, AI, and IoT Adoption
Published 2025-06-01“…Specifically, survey data revealed that only 10% of firms currently use AI, despite 67% recognizing its value for fraud detection. …”
Get full text
Article -
1467
Investigating the role of information technology system integration, user acceptance and information technology satisfaction and security on efficiency and accuracy of immigration...
Published 2025-01-01“…Research data analysis uses structural equation modeling (SEM). …”
Get full text
Article -
1468
-
1469
Deciphering the evolution of metaverse - A techno-functional perspective in digital marketing
Published 2024-11-01Get full text
Article -
1470
-
1471
Patient and wearable device authentication utilizing attribute-based credentials and permissioned blockchains in smart homes
Published 2023-06-01“…The sensitive nature of health data requires safeguards to ensure patients’ privacy is not violated. …”
Get full text
Article -
1472
An anonymous authentication protocol for vehicle to grid based on elliptic curve cryptography
Published 2025-08-01“…Once these data are leaked, the privacy and security of users will be threatened. …”
Get full text
Article -
1473
The Impact of Operating System on Bandwidth in Open VPN Technology
Published 2016-03-01“…The internet is a basic source of information for many specialities and uses. Such information includes sensitive data whose retrieval has been one of the basic functions of the internet. …”
Get full text
Article -
1474
Machine Learning in Ambient Assisted Living for Enhanced Elderly Healthcare: A Systematic Literature Review
Published 2025-01-01“…Issues around data privacy, security breaches, and the need for robust privacy-preserving mechanisms are recurrent themes. …”
Get full text
Article -
1475
Implementasi Teknologi Blockchain dalam Digital Marketing
Published 2024-12-01“…Some respondents were concerned about their privacy on the use of digital marketing, especially the abuse of their privacy related to user data. …”
Get full text
Article -
1476
A New Framework for Enhancing VANETs through Layer 2 DLT Architectures with Multiparty Threshold Key Management and PETs
Published 2024-09-01“…This transition applies a decentralized ledger mechanism to ensure correctness, reliability, accuracy, and security against various known attacks. The use of Layer 2 DLTs in our framework enhances key management, trust distribution, and data privacy, offering cost and speed advantages over Layer 1 DLTs, thereby enabling secure vehicle-to-everything (V2X) communication. …”
Get full text
Article -
1477
تطبیقات الهواتف الذکیة والخصوصیة المعلوماتیة : دراسة تحلیلیة مقارنة
Published 2020-09-01“…In recent years there has been alegislative response at different levels for the sake of this protection, and thejudiciary has followed it with a remarkable response in favour of the jurisprudenceof the private life of individuals that is of paramount importance to both theindividual and the community.This coincided with the increasing vulnerability of the right to privacy tothe digital environment through e-mail and chat sites Networks or communicationsites, which have become a hoot of the modern era and a wide electronic space,in which we put all the references about us and our lives, as well as our privacy.The purpose of this study is to diagnose the reality of the work of Google Playapplications that work on the smart phone environment, especially with regard togathering information or allowing access to personal data and users’ information,by identifying the nature of data and information collected or allowed access to,monitoring the nature of the risks of using these applications.To do so, the researcher studied and analyzed licensing agreements forthe use of 80 applications of smart phones in areas commonly used in the digitalenvironment, such as social networking applications, Online banks Applications,antivirus applications, web search applications, news and press applications,educational applications, web applications, travel and tourism applications. …”
Get full text
Article -
1478
Towards digital health: Integrating federated learning and crowdsensing through the Contigo app
Published 2024-12-01“…This digitization supposes a challenge from the point of view of privacy and the treatment of sensitive personal data while providing non-intrusive and easy-to-use digital mechanisms. …”
Get full text
Article -
1479
Facebook as a Digital Public Sphere: Processes of Colonization and Emancipation
Published 2012-01-01“…The analysis focuses on Facebook’s communicative-structural contexts, in particular from the viewpoint of user terms, user manoeuvre, privacy/data use policy, and ownership and use of uploaded material. …”
Get full text
Article -
1480
cellKey - An R Package to Perturb Statistical Tables
Published 2025-05-01“… National statistical offices (NSIs) routinely publish aggregated data in the form of statistical tables. However, ensuring data privacy is a critical aspect of this process. …”
Get full text
Article