Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
\\"useds » \\"usedds (Expand Search)
\"useddddddddds » \"usedddddddddds (Expand Search)
\"useds » \"usedds (Expand Search)
\\"use » \\"used (Expand Search)
\\"useds » \\"usedds (Expand Search)
\"useddddddddds » \"usedddddddddds (Expand Search)
\"useds » \"usedds (Expand Search)
\\"use » \\"used (Expand Search)
-
341
Applying usability recommendations when developing mobile instant messaging applications
Published 2022-02-01Get full text
Article -
342
Risk assessment of data protection in the maritime industry using system-theoretic process analysis
Published 2025-06-01“…Data protection assessment is a significant issue to security and privacy enhancement. …”
Get full text
Article -
343
Protection of Public Services Personal Data in The Delivery of Public Services: Comparative Study in Indonesia and Malaysia
Published 2025-03-01“…However, the exposure of personal data in public service is worrying, as data breaches have affected the public's privacy. …”
Get full text
Article -
344
Securing face images in UAV networks using chaos and DNA cryptography approach
Published 2025-07-01“…Abstract In future applications of UAVs, the frequent transmission of image data raises significant security concerns, particularly regarding the privacy of facial information. …”
Get full text
Article -
345
A clustering-based approach for classifying data streams using graph matching
Published 2025-02-01“…Abstract In response to challenges such as data encryption, uneven distribution, and user privacy concerns in network traffic classification, this paper presents a clustering-based approach.In response to challenges such as data encryption, uneven distribution, and user privacy concerns in network traffic classification, this paper presents a clustering-based approach. …”
Get full text
Article -
346
PK-Judge: Enhancing IP Protection of Neural Network Models Using an Asymmetric Approach
Published 2025-03-01Get full text
Article -
347
“By browsing this site, you accept cookies”: Research on the cookie usage permissions of news sites in Türkiye
Published 2023-06-01“…Particularly in recent years, increasing awareness levels about personal data, digital privacy studies, and legal regulations have raised concerns about the use of cookies. …”
Get full text
Article -
348
Synthetic healthcare data utility with biometric pattern recognition using adversarial networks
Published 2025-03-01Get full text
Article -
349
Prexion: Probabilistic Matching-Based Compression to Mitigate Compression Side Channel Attacks Against HTTPS
Published 2025-01-01“…Web servers typically use data compression and encryption to optimize data transmission and protect user privacy. …”
Get full text
Article -
350
Secure and trusted data sharing in smart healthcare using blockchain and IoT integration
Published 2025-08-01“…A device proxy monitors potentially vulnerable IoT devices and uses cryptography to ensure that data remains private. …”
Get full text
Article -
351
Effective deep learning aided vehicle classification approach using Seismic Data
Published 2025-07-01“…Our approach achieves an impressive accuracy of 99.8%, underscoring its potential for robust and precise VC in ITSs using seismic data, particularly in data-scarce scenarios. …”
Get full text
Article -
352
On the edge of glory (…or catastrophe): regulation, transparency and party democracy in data-driven campaigning in Québec
Published 2019-12-01“…They have all massively integrated data-driven campaigning practices. This article identifies factors that could explain the increasing pressure to regulate Québec’s political parties’ uses of large sets of digital voter information. …”
Get full text
Article -
353
ECDSA-based tamper detection in medical data using a watermarking technique
Published 2024-01-01“…Telemedicine is a form of healthcare delivery that employs communication technology to provide medical care to patients remotely. The use of telemedicine has seen a significant increase in recent years, presenting challenges such as patient privacy, data security, the need for reliable communication technology, and the potential for misdiagnosis without a physical examination. …”
Get full text
Article -
354
PERSONAL DATA PROTECTION ISSUE REFLECTED IN THE CASE-LAW OF THE CONSTITUTIONAL COURT OF ROMANIA
Published 2019-05-01“…Over the past few years, data privacy became more and more an issue that stirred on European level lots of debates and determined the adoption of a new set of rules, imposed with the compulsory force of a European regulation. …”
Get full text
Article -
355
A Set of Tools and Data Management Framework for the IoT–Edge–Cloud Continuum
Published 2024-12-01“…The approach of the IECC Data Management Framework (DMF) introduces a novel combination of multiple easy-to-configure plugin environments using data visualization features. …”
Get full text
Article -
356
SAFED: secure and adaptive framework for edge-based data aggregation in IoT applications
Published 2025-04-01“…Based on requirements, the control center decrypts the aggregated data using its private key. Employing the Paillier cryptosystem for encryption and RSA for authentication, SAFED is fault-tolerant, maintaining functionality even if some IoT nodes fail. …”
Get full text
Article -
357
Secure K-Means Clustering Scheme for Confidential Data Based on Paillier Cryptosystem
Published 2025-06-01“…The protocol uses the additive homomorphism property of the Paillier cryptosystem to perform K-means clustering on the encrypted data, which ensures the confidentiality of the data during the whole calculation process. …”
Get full text
Article -
358
-
359
BeyondLife: An Open-Source Digital Will Solution for Posthumous Data Management
Published 2025-01-01“…Managing posthumous data is becoming an increasingly complex challenge, with many existing technical solutions proving impractical in real-world applications. …”
Get full text
Article -
360
Protecting contacts against privacy leaks in smartphones.
Published 2018-01-01Get full text
Article