Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
\\"usedds » \\"useddds (Expand Search)
\"usedddds » \"useddddds (Expand Search)
\\"use » \\"used (Expand Search)
\\"usedds » \\"useddds (Expand Search)
\"usedddds » \"useddddds (Expand Search)
\\"use » \\"used (Expand Search)
-
661
Hybrid-chain-based supervision scheme for privacypreserving trading system
Published 2023-12-01“…Due to its characteristics of decentralization, transparency, and security, blockchain technology is widely used in finance, the Internet of Things, and supply chain.However, along with the opportunities it brings, the application of blockchain technology also presents new challenges.On one hand, traditional centralized regulatory methods can undermine the decentralized and autonomous nature of blockchain, creating regulatory dilemmas.On the other hand, blockchain-based systems require privacy protection as transactions often contain sensitive information beyond currency amounts.Failure to protect privacy can result in information leakage and make it difficult for authorities to monitor transactions.To address these challenges and enable regulation in privacy-preserving blockchain-based trading systems, a hybrid chain framework was proposed.This framework incorporated a multiple committee-based approach for general cross-chain regulation.Separate committees were established for the supervision chain and service chain.The service chain committee handled service chain data, generating and sending proofs to the supervision chain to achieve private supervision.In addition to single-chain regulation, cross-chain communication committees and supervision committees collaborated to achieve cross-chain transaction supervision among different service chains.Through a security analysis, it is proven that the proposed scheme is secure when each module meets its security requirements.Experimental evaluations have been conducted to demonstrate the feasibility of the proposed scheme, showing that it achieves cross-chain supervision at a low cost and is scalable.…”
Get full text
Article -
662
Social media applications through the lens of DeLone and McLean’s information system success model: does perceived privacy matter?
Published 2025-07-01“…Therefore, this study explores the impact of perceived privacy on the relationship between tripartite quality constructs, user satisfaction, and continual usage using DeLone and McLean’s information system success (ISS) model. …”
Get full text
Article -
663
Generative AI-Based Judicial Ruling Disclosure System Innovation: A Legal and Technological Approach to Balancing Privacy Protection and the Right to Information
Published 2025-06-01“…Using actual court data, we compared the performance of fine-tuned sLLMs with that of few-shot Large Language Models (LLMs, e.g., GPT-4o). …”
Get full text
Article -
664
The effect of social grooming via live photo-sharing on well-being: the mediating role of social capital and moderating role of the need for privacy
Published 2025-07-01“…However, the spontaneous nature of live photos may unintentionally reveal audio or visual details, raising privacy concerns. Previous research has not fully explored why users share live photos despite these risks, nor how live photo sharing affects users’ well-being from a social grooming perspective.MethodsWe surveyed 266 users of WeChat Moments and analyzed the data using a moderated mediation model. …”
Get full text
Article -
665
Privacy Concerns Versus Personalized Health Content—Pregnant Individuals’ Willingness to Share Personal Health Information on Social Media: Survey Study
Published 2025-02-01“…MethodsWe designed and deployed an electronic survey to pregnant individuals worldwide electronically in 2023. We used the classical Internet Users’ Information Privacy Concerns (IUIPC) model to examine how privacy concerns modulate pregnant individuals’ behaviors and beliefs regarding risk and trust when using social media for health purposes. …”
Get full text
Article -
666
Securing face images in UAV networks using chaos and DNA cryptography approach
Published 2025-07-01“…Abstract In future applications of UAVs, the frequent transmission of image data raises significant security concerns, particularly regarding the privacy of facial information. …”
Get full text
Article -
667
A clustering-based approach for classifying data streams using graph matching
Published 2025-02-01“…Abstract In response to challenges such as data encryption, uneven distribution, and user privacy concerns in network traffic classification, this paper presents a clustering-based approach.In response to challenges such as data encryption, uneven distribution, and user privacy concerns in network traffic classification, this paper presents a clustering-based approach. …”
Get full text
Article -
668
Synthetic healthcare data utility with biometric pattern recognition using adversarial networks
Published 2025-03-01Get full text
Article -
669
Secure and Reversible Face De-Identification With Format-Preserving Encryption
Published 2025-01-01“…In conclusion, the proposed method provides a robust privacy-preserving solution for facial data in digital environments, balancing security and utility while supporting lawful restoration.…”
Get full text
Article -
670
Secure and trusted data sharing in smart healthcare using blockchain and IoT integration
Published 2025-08-01“…A device proxy monitors potentially vulnerable IoT devices and uses cryptography to ensure that data remains private. …”
Get full text
Article -
671
Effective deep learning aided vehicle classification approach using Seismic Data
Published 2025-07-01“…Our approach achieves an impressive accuracy of 99.8%, underscoring its potential for robust and precise VC in ITSs using seismic data, particularly in data-scarce scenarios. …”
Get full text
Article -
672
ECDSA-based tamper detection in medical data using a watermarking technique
Published 2024-01-01“…Telemedicine is a form of healthcare delivery that employs communication technology to provide medical care to patients remotely. The use of telemedicine has seen a significant increase in recent years, presenting challenges such as patient privacy, data security, the need for reliable communication technology, and the potential for misdiagnosis without a physical examination. …”
Get full text
Article -
673
A review of quantum communication and information networks with advanced cryptographic applications using machine learning, deep learning techniques
Published 2025-03-01“…Quantum-secured networks enhance urban security, smart management, and infrastructure protection by providing data privacy and facilitating secure data transmission, thereby facilitating robust infrastructure and technological development.…”
Get full text
Article -
674
Edge Computing Architectures for Low-Latency Data Processing in Internet of Things Applications
Published 2025-01-01Get full text
Article -
675
CPS-IIoT-P2Attention: Explainable Privacy-Preserving With Scaled Dot-Product Attention in Cyber-Physical System-Industrial IoT Network
Published 2025-01-01“…The findings revealed that the scaled dot product attention mechanism dramatically boosts model performance, while Pearson correlation and agglomerative clustering safeguard data privacy in CPS-IIoT, surpassing the performance of existing state-of-the-art (SOTA) models. …”
Get full text
Article -
676
-
677
MANAJEMEN PRIVASI KOMUNIKASI MEDIA SOSIAL TWITTER OLEH MAHASISWA UNY COMMUNICATION PRIVACY MANAGEMENT OF SOCIAL MEDIA TWITTER BY UNY COLLEGE STUDENT
Published 2023-03-01“…The process of collecting data using the interview method. Test the validity of the data using source triangulation techniques, as well as four stages of data analysis: collection, reduction, presentation, and drawing conclusions. …”
Get full text
Article -
678
Real-Time Financial Fraud Detection Using Adaptive Graph Neural Networks and Federated Learning
Published 2025-03-01Get full text
Article -
679
An Efficient and Expressive Fully Policy-Hidden Ciphertext-Policy Attribute-Based Encryption Scheme for Satellite Service Systems
Published 2024-09-01“…Access policies are uploaded to the cloud, stored, and downloaded in plain text, making them vulnerable to privacy breaches. When the access policy is completely hidden, users need to use their own attributes to try matching one by one, which is an inefficient process. …”
Get full text
Article -
680
Synthesis of electric vehicle charging data: A real-world data-driven approach
Published 2024-12-01“…In response, this study introduces an innovative methodology for generating large-scale and diverse EV charging data, mirroring real-world patterns for cost-efficient and privacy-compliant use. …”
Get full text
Article