Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
\\"useds » \\"usedds (Expand Search)
\"usedddddds » \"useddddddds (Expand Search)
\"useds » \"usedds (Expand Search)
\\"use » \\"used (Expand Search)
\\"useds » \\"usedds (Expand Search)
\"usedddddds » \"useddddddds (Expand Search)
\"useds » \"usedds (Expand Search)
\\"use » \\"used (Expand Search)
-
921
Multi-dimensional secure query scheme for fog-enhanced IIoT
Published 2020-08-01“…In view of the fact that most of the existing range query schemes for fog-enhanced IoT cannot achieve both multi-dimensional query and privacy protection,a privacy-preserving multi-dimensional secure query scheme for fog-enhanced IIoT was proposed.Firstly,the multiple ranges to be queried were mapped into a certain query matrix.Then,auxiliary vectors were constructed to decompose the query matrix,and then the auxiliary vector was processed by BGN homomorphic encryption to form a query trapdoor.Finally,with the homomorphic computation utilized by an IoT device terminal,the query trapdoor could be matched to its sensor data.Spatial complexity could be effectively reduced with the used specific auxiliary vectors.The confidentiality of sensor data could be ensured and the privacy of user’s query mode could be protected by the homomorphic encryption property.Experiments results show that the computational and communication costs are relatively low.…”
Get full text
Article -
922
Addressing the gap in health data management skills: an online self-guided course for researchers and health professionals
Published 2024-11-01“…This gap is pronounced in low- and middle-income countries (LMICs), where data privacy concerns and inadequate infrastructure hinder efforts to utilise and share health data. …”
Get full text
Article -
923
Two-party cooperative blind signature based on SM2
Published 2022-12-01“…SM2, issued by China in 2010, is a public key cryptography standard based on elliptic curves.It has been widely used in finance, social security and other fields thanks to its advantages of improved signature efficiency, decreased storage space and computing complexity than RSA.With the popularization and application of SM2, the issues of its key security and data privacy are of great concern.The single-key mode inhibits the potential application in multi-user settings, and the leakage of the key will threaten the security of the entire cryptosystem due to the centralization.The problem of secure storage and reasonable utilization of keys needs to be solved urgently.In addition, the SM2 digital signature algorithm cannot guarantee the message privacy.Aiming at the issues of key security and data privacy of the signature algorithm, many researchers have proposed the idea of cooperative signature and blind signature for SM2.However, there isn’t SM2 collaborative blind signature scheme proposed.Then a two-party cooperative blind signing protocol based on SM2 was proposed in this paper, which allowed two parties to sign except the user.The signing process did not require recovering the complete private key, while not revealing the information of the partial private key and secret number.The key was stored separately to improve the security of the key, while the blind signature protected the privacy of the message.In terms of security, the protocol satisfied unforgeability and unlinkability.The protocol was implemented using C to demonstrate the efficiency of each participant’s local operation.In the honest model, the time cost of each entity in the cooperative signature phase was similar as that of executing a lightweight SM2 blind signature.Overall, the proposed protocol has certain advantages in terms of function and efficiency.…”
Get full text
Article -
924
“Crying in the Wilderness”—The Use of Web-Based Support in Telomere Biology Disorders: Thematic Analysis
Published 2024-12-01“…Participants found web-based resources useful for information-seeking but reported privacy concerns and frustration with forming supportive relationships. …”
Get full text
Article -
925
Visible Light Communication for Underwater Applications: Principles, Challenges, and Future Prospects
Published 2025-06-01Get full text
Article -
926
Understanding user’s identifiability on social media: a supervised machine learning and self-reporting investigation
Published 2025-09-01“…The relationship between machine-predicted and self-reported identifiability was tested using data from 91 participants. Based on the degree of deviation between the two, users can be divided into four categories—normal, conservative, active, and atypical—which reflect their sensitivity to privacy concerns and preferences regarding information disclosure. …”
Get full text
Article -
927
A Study on Factors Affecting the Continuance Usage Intention of Social Robots with Episodic Memory: A Stimulus–Organism–Response Perspective
Published 2025-05-01“…A structural model incorporating key perceived features (intimacy, morality, dependency, and information privacy risk) was tested with survey data from 285 MOCCA users and analyzed using Partial Least Squares Structural Equation Modeling (PLS-SEM). …”
Get full text
Article -
928
VF-CART: A communication-efficient vertical federated framework for the CART algorithm
Published 2023-01-01“…With growing concerns about privacy and the fact that data are distributed among multiple parties in realistic scenarios, vertical federated learning (VFL) is becoming increasingly important. …”
Get full text
Article -
929
Perceptions of, Barriers to, and Facilitators of the Use of AI in Primary Care: Systematic Review of Qualitative Studies
Published 2025-06-01“…We identified four analytical themes using thematic synthesis: (1) change in the physician-patient relationship, highlighting concerns about loss of empathy, connection, and trust; (2) AI as a partner for efficient time and information management, including its potential to improve workflow and decision-making, alongside skepticism about increased workload; (3) data as the cornerstone of AI development, reflecting concerns about data privacy, quality, bias, and corporate responsibility; and (4) barriers to and facilitators of AI in primary care, emphasizing equity, accessibility, and stakeholder co-design. …”
Get full text
Article -
930
Application of Spritz Encryption in Smart Meters to Protect Consumer Data
Published 2019-01-01“…However, enhanced communications make Smart Grid more susceptible to privacy leaks and cyber attacks. Small meters collect detailed consumer data, such as power consumption, which can then become a major source of privacy leakage. …”
Get full text
Article -
931
Medical laboratory data-based models: opportunities, obstacles, and solutions
Published 2025-07-01“…Despite these benefits, challenges such as data quality, model optimization, computational requirements, and limited interpretability remain, along with concerns about data privacy, fairness, and security. …”
Get full text
Article -
932
Application of edge computing technology in smart grid data security
Published 2025-02-01“…By blinding the power and information, the signcrypter can not know the specific power consumption information of the user, so as to ensure the data privacy and security of the user. Implement forward security using proxy key update mechanism and perform batch verification of user signature ciphertext. …”
Get full text
Article -
933
Social media and internet use among orthopedic patients in Germany—a multicenter survey
Published 2025-04-01“…There is limited data regarding which SM orthopedic patients use and what benefits and risks of SM they perceive.MethodsAn online survey was conducted from April to December 2023 among orthopedic and trauma patients in five German orthopedic clinics. …”
Get full text
Article -
934
Consumer opinion on the use of machine learning in healthcare settings: A qualitative systematic review
Published 2025-01-01“…The meta-synthesis identified four overarching themes across the included studies: (1) Trust, fear, and uncertainty; (2) Data privacy and ML governance; (3) Impact on healthcare delivery and access; and (4) Consumers want to be engaged. …”
Get full text
Article -
935
Integrating Data Analytics into Traditional Media: Opportunities and Strategic Advantages
Published 2025-05-01“…Moreover, the use of personal data raises concerns in terms of privacy and ethical standards, which necessitates a careful balancing act between leveraging data for analysing and maintaining the users’ trust. …”
Get full text
Article -
936
Improved Private Data Protection Scheme for Blockchain Smart Contracts
Published 2023-01-01“…To tackle these challenges and promote the development of blockchain technology, this paper presents a scheme that enhances privacy data protection in blockchain smart contracts using edge computing and a master-slave multichain architecture. …”
Get full text
Article -
937
Policy guidelines and recommendations on AI use in teaching and learning: A meta-synthesis study
Published 2025-01-01“…Under the theme of policies and guidelines, notable subthemes include ethical AI use, AI literacy, and inclusivity and equity. In terms of implementation strategies, the synthesis identifies crucial areas such as student orientation and professional development, enhanced teaching tools and data-driven insights, improved student learning outcomes and engagement, and streamlined administrative processes. …”
Get full text
Article -
938
ARTIFICIAL INTELLIGENCE AND BIG DATA ANALYSIS IN CRIME PREVENTION AND COMBAT
Published 2025-03-01“…In the era of accelerated digitalization, the use of artificial intelligence (AI) and big data analysis has become a necessity in crime prevention and combat. …”
Get full text
Article -
939
Particular qualities of evaluation of electronic card data in modern healthcare
Published 2025-01-01“…The article discusses various aspects of the implementation and use of EHR, including technical difficulties, data privacy and security issues. …”
Get full text
Article -
940
The Ethics of Data and Its Governance: A Discourse Theoretical Approach
Published 2025-06-01“…Drawing on Habermas’s Theory of Communicative Action and using the example of neuro data, this paper argues that data shapes and is shaped by discourses. …”
Get full text
Article