Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
\\"useds » \\"usedds (Expand Search)
\"useddddddds » \"usedddddddds (Expand Search)
\"useds » \"usedds (Expand Search)
\\"use » \\"used (Expand Search)
\\"useds » \\"usedds (Expand Search)
\"useddddddds » \"usedddddddds (Expand Search)
\"useds » \"usedds (Expand Search)
\\"use » \\"used (Expand Search)
-
1001
Conditions for anonymity in some generic public-key encryption constructions
Published 2009-01-01“…In applications of public-key encryption schemes, anonymity(key-privacy) as well as security(data-privacy) is useful and widely desired.Recently Canetti-Halevi-Katz proposed a generic and elegant IBE-based construction for(tra-ditional) public-key encryption, whose performance was improved by another construction proposed by Boneh-Katz.To analyze such two constructions’ anonymity, two new and generic concepts in IBE scheme,"master-key anonymity"and"relevant master-key anonymity"were proposed and two different sufficient conditions for chosen-ciphertext anonymity were proved for Canetti-Halevi-Katz and Boneh-Katz constructions.…”
Get full text
Article -
1002
Efficient IoT User Authentication Protocol with Semi-Trusted Servers
Published 2025-03-01Get full text
Article -
1003
Conditions for anonymity in some generic public-key encryption constructions
Published 2009-01-01“…In applications of public-key encryption schemes, anonymity(key-privacy) as well as security(data-privacy) is useful and widely desired.Recently Canetti-Halevi-Katz proposed a generic and elegant IBE-based construction for(tra-ditional) public-key encryption, whose performance was improved by another construction proposed by Boneh-Katz.To analyze such two constructions’ anonymity, two new and generic concepts in IBE scheme,"master-key anonymity"and"relevant master-key anonymity"were proposed and two different sufficient conditions for chosen-ciphertext anonymity were proved for Canetti-Halevi-Katz and Boneh-Katz constructions.…”
Get full text
Article -
1004
Artificial Intelligence in Retail: Benefits and Risks Associated With Mobile Shopping Applications
Published 2021-02-01“…The objective of the study is to examine the practical implications of using artificial intelligence (AI) based solutions in the case of retail mobile applications, to enhance the online shopping experience and improve the engagement by also having in mind the privacy of the users. …”
Get full text
Article -
1005
Examining inclusivity: the use of AI and diverse populations in health and social care: a systematic review
Published 2025-02-01“…A holistic approach must be used to address disparities, enforce effective regulations, safeguard privacy, promote inclusion and equity, and emphasize rigorous validation.…”
Get full text
Article -
1006
-
1007
Investigating High School Students’ Attitudes Toward the Use of AI in Education: Evidence from Cambodia
Published 2025-07-01“…Utilizing evidence from an online survey with 315 students (female = 62.50%), the study showed that Cambodian high school students expressed generally favorable attitudes toward utilizing AI-powered tools in education, particularly pertaining to the use of AI to aid in completing school work. However, the study identified key concerns about data privacy and security issues, the risk of becoming over-dependent on AI, and limited originality about students’ work. …”
Get full text
Article -
1008
Telemedicine data secure sharing scheme based on heterogeneous federated learning
Published 2024-10-01“…However, the reuse process of telemedicine user privacy data based on federated learning also faces significant challenges. …”
Get full text
Article -
1009
Assessment of gender-related differences in digital financial services use and health worker performance in Nigeria
Published 2025-07-01“…Quantitative data was analyzed using the student t-test, while inductive coding approach was adopted for qualitative data. …”
Get full text
Article -
1010
Promises and Pitfalls of Internet Search Data in Mental Health: Critical Review
Published 2025-02-01“…In this paper, we discuss the various problems related to the use of these data in research and clinical practice, including privacy concerns, integration with clinical information, and technical limitations. …”
Get full text
Article -
1011
Establishing A Personal Data Protection Agency for E-Commerce in Indonesia
Published 2024-12-01“… The rapid growth of e-commerce in Indonesia has led to a significant increase in the collection and processing of personal data, raising concerns regarding data security and privacy rights. …”
Get full text
Article -
1012
Live research dialogue on the benefits, costs and utility of synthetic data for researchers
Published 2024-11-01“… • To discuss governance frameworks essential for the routine creation, dissemination, and use of synthetic data. • Drawing on the experience of international participants, explore measures to mitigate risks to data privacy and public perception relating to synthetic data creation and use whilst maximising its utility. …”
Get full text
Article -
1013
A Data-Driven Approach for Generating Synthetic Load Profiles with GANs
Published 2025-07-01“…The generation of realistic electrical load profiles is essential for advancing smart grid analytics, demand forecasting, and privacy-preserving data sharing. Traditional approaches often rely on large, high-resolution datasets and complex recurrent neural architectures, which can be unstable or ineffective when training data are limited. …”
Get full text
Article -
1014
Dynamic Ensemble Selection for EEG Signal Classification in Distributed Data Environments
Published 2025-05-01“…This study presents a novel approach to EEG signal classification in distributed environments using dynamic ensemble selection. In scenarios where data dispersion arises due to privacy constraints or decentralized data collection, traditional global modelling is impractical. …”
Get full text
Article -
1015
Federated learning framework for IoT intrusion detection using tab transformer and nature-inspired hyperparameter optimization
Published 2025-05-01“…The goal of the developed framework is to improve the detection of IDS without using centralized data to preserve privacy. Whereas it enhances the processing and detection capability of huge amounts of data generated from IoT devices. …”
Get full text
Article -
1016
Shopping Data for Population Health Surveillance: Opportunities, Challenges, and Future Directions
Published 2025-08-01“…This paper explores the potential of loyalty card data to strengthen public health surveillance across 4 key behavioral risk domains: diet, alcohol, tobacco, and over-the-counter medication use. …”
Get full text
Article -
1017
Comprehensive testing of large language models for extraction of structured data in pathology
Published 2025-03-01“…While recent studies show promise in using advanced language models for structuring pathology data, they primarily rely on proprietary models, raising cost and privacy concerns. …”
Get full text
Article -
1018
SHARE: An ethical framework for equitable data sharing in Caribbean health research
Published 2024-12-01“…Using the SHARE framework can support regionally relevant and culturally responsive work already underway in the region and further develop capacity for intentional sharing and (re)use of Caribbean health data.…”
Get full text
Article -
1019
Blockchain and NFT-Based Solution for Genomic Data Management, Sharing, and Monetization
Published 2025-01-01“…In this paper, we propose a blockchain and NFT-based solution that addresses the challenges of managing, sharing, and monetizing genomic data while preserving privacy using Threshold Cryptography and Fully Homomorphic Encryption (FHE). …”
Get full text
Article -
1020
A big data analysis algorithm for massive sensor medical images
Published 2024-11-01“…The smart sensor-based big data analysis recommendation system has significant privacy and security concerns when using sensor medical images for suggestions and monitoring. …”
Get full text
Article