Search alternatives:
\\"useds » \\"usedds (Expand Search)
\"useddddds » \"usedddddds (Expand Search)
\"useds » \"usedds (Expand Search)
\\"use » \\"used (Expand Search)
Showing 921 - 940 results of 2,784 for search '"\"((((\\"useds OR \"useddddds) OR \"useds) privacy data\\") OR (\\"use privacy data\\"))\""', query time: 0.15s Refine Results
  1. 921

    Multi-dimensional secure query scheme for fog-enhanced IIoT by Yousheng ZHOU, Chang TAN, Fei TANG

    Published 2020-08-01
    “…In view of the fact that most of the existing range query schemes for fog-enhanced IoT cannot achieve both multi-dimensional query and privacy protection,a privacy-preserving multi-dimensional secure query scheme for fog-enhanced IIoT was proposed.Firstly,the multiple ranges to be queried were mapped into a certain query matrix.Then,auxiliary vectors were constructed to decompose the query matrix,and then the auxiliary vector was processed by BGN homomorphic encryption to form a query trapdoor.Finally,with the homomorphic computation utilized by an IoT device terminal,the query trapdoor could be matched to its sensor data.Spatial complexity could be effectively reduced with the used specific auxiliary vectors.The confidentiality of sensor data could be ensured and the privacy of user’s query mode could be protected by the homomorphic encryption property.Experiments results show that the computational and communication costs are relatively low.…”
    Get full text
    Article
  2. 922

    Addressing the gap in health data management skills: an online self-guided course for researchers and health professionals by Naomi Waithira, Brian Mutinda, Kehkashan Shah, Evelyne Kestelyn, Susan Bull, Liam Boggs, Trudie Lang, Phaik Yeong Cheah

    Published 2024-11-01
    “…This gap is pronounced in low- and middle-income countries (LMICs), where data privacy concerns and inadequate infrastructure hinder efforts to utilise and share health data. …”
    Get full text
    Article
  3. 923

    Two-party cooperative blind signature based on SM2 by Xue BAI, Baodong QIN, Rui GUO, Dong ZHENG

    Published 2022-12-01
    “…SM2, issued by China in 2010, is a public key cryptography standard based on elliptic curves.It has been widely used in finance, social security and other fields thanks to its advantages of improved signature efficiency, decreased storage space and computing complexity than RSA.With the popularization and application of SM2, the issues of its key security and data privacy are of great concern.The single-key mode inhibits the potential application in multi-user settings, and the leakage of the key will threaten the security of the entire cryptosystem due to the centralization.The problem of secure storage and reasonable utilization of keys needs to be solved urgently.In addition, the SM2 digital signature algorithm cannot guarantee the message privacy.Aiming at the issues of key security and data privacy of the signature algorithm, many researchers have proposed the idea of cooperative signature and blind signature for SM2.However, there isn’t SM2 collaborative blind signature scheme proposed.Then a two-party cooperative blind signing protocol based on SM2 was proposed in this paper, which allowed two parties to sign except the user.The signing process did not require recovering the complete private key, while not revealing the information of the partial private key and secret number.The key was stored separately to improve the security of the key, while the blind signature protected the privacy of the message.In terms of security, the protocol satisfied unforgeability and unlinkability.The protocol was implemented using C to demonstrate the efficiency of each participant’s local operation.In the honest model, the time cost of each entity in the cooperative signature phase was similar as that of executing a lightweight SM2 blind signature.Overall, the proposed protocol has certain advantages in terms of function and efficiency.…”
    Get full text
    Article
  4. 924
  5. 925
  6. 926

    Understanding user’s identifiability on social media: a supervised machine learning and self-reporting investigation by Xi Chen, Hao Ding, Jian Mou, Yuping Zhao

    Published 2025-09-01
    “…The relationship between machine-predicted and self-reported identifiability was tested using data from 91 participants. Based on the degree of deviation between the two, users can be divided into four categories—normal, conservative, active, and atypical—which reflect their sensitivity to privacy concerns and preferences regarding information disclosure. …”
    Get full text
    Article
  7. 927

    A Study on Factors Affecting the Continuance Usage Intention of Social Robots with Episodic Memory: A Stimulus–Organism–Response Perspective by Yi Yang, Hye-Kyung Cho, Min-Yong Kim

    Published 2025-05-01
    “…A structural model incorporating key perceived features (intimacy, morality, dependency, and information privacy risk) was tested with survey data from 285 MOCCA users and analyzed using Partial Least Squares Structural Equation Modeling (PLS-SEM). …”
    Get full text
    Article
  8. 928

    VF-CART: A communication-efficient vertical federated framework for the CART algorithm by Yang Xu, Xuexian Hu, Jianghong Wei, Hongjian Yang, Kejia Li

    Published 2023-01-01
    “…With growing concerns about privacy and the fact that data are distributed among multiple parties in realistic scenarios, vertical federated learning (VFL) is becoming increasingly important. …”
    Get full text
    Article
  9. 929

    Perceptions of, Barriers to, and Facilitators of the Use of AI in Primary Care: Systematic Review of Qualitative Studies by Héctor Martínez-Martínez, Julia Martínez-Alfonso, Belén Sánchez-Rojo-Huertas, Valeria Reynolds-Cortez, Andrea Turégano-Chumillas, Victoria A Meseguer-Ruiz, Shkelzen Cekrezi, Vicente Martínez-Vizcaíno

    Published 2025-06-01
    “…We identified four analytical themes using thematic synthesis: (1) change in the physician-patient relationship, highlighting concerns about loss of empathy, connection, and trust; (2) AI as a partner for efficient time and information management, including its potential to improve workflow and decision-making, alongside skepticism about increased workload; (3) data as the cornerstone of AI development, reflecting concerns about data privacy, quality, bias, and corporate responsibility; and (4) barriers to and facilitators of AI in primary care, emphasizing equity, accessibility, and stakeholder co-design. …”
    Get full text
    Article
  10. 930

    Application of Spritz Encryption in Smart Meters to Protect Consumer Data by Lincoln Kamau Kiarie, Philip Kibet Langat, Christopher Maina Muriithi

    Published 2019-01-01
    “…However, enhanced communications make Smart Grid more susceptible to privacy leaks and cyber attacks. Small meters collect detailed consumer data, such as power consumption, which can then become a major source of privacy leakage. …”
    Get full text
    Article
  11. 931

    Medical laboratory data-based models: opportunities, obstacles, and solutions by Jiaojiao Meng, Moxin Wu, Fangmin Shi, Ying Xie, Hui Wang, You Guo

    Published 2025-07-01
    “…Despite these benefits, challenges such as data quality, model optimization, computational requirements, and limited interpretability remain, along with concerns about data privacy, fairness, and security. …”
    Get full text
    Article
  12. 932

    Application of edge computing technology in smart grid data security by Zhuo Cheng, Jiangxin Li, Jianjun Zhang, Chen Wang, Hui Wang, Juyin Wu

    Published 2025-02-01
    “…By blinding the power and information, the signcrypter can not know the specific power consumption information of the user, so as to ensure the data privacy and security of the user. Implement forward security using proxy key update mechanism and perform batch verification of user signature ciphertext. …”
    Get full text
    Article
  13. 933

    Social media and internet use among orthopedic patients in Germany—a multicenter survey by Yasmin Youssef, Tu-Lan Vu-Han, Tu-Lan Vu-Han, Richard Trauth, Georg Osterhoff, David Alexander Back, Tobias Gehlen, Tobias Gehlen

    Published 2025-04-01
    “…There is limited data regarding which SM orthopedic patients use and what benefits and risks of SM they perceive.MethodsAn online survey was conducted from April to December 2023 among orthopedic and trauma patients in five German orthopedic clinics. …”
    Get full text
    Article
  14. 934

    Consumer opinion on the use of machine learning in healthcare settings: A qualitative systematic review by Jacqueline H Stephens, Celine Northcott, Brianna F Poirier, Trent Lewis

    Published 2025-01-01
    “…The meta-synthesis identified four overarching themes across the included studies: (1) Trust, fear, and uncertainty; (2) Data privacy and ML governance; (3) Impact on healthcare delivery and access; and (4) Consumers want to be engaged. …”
    Get full text
    Article
  15. 935

    Integrating Data Analytics into Traditional Media: Opportunities and Strategic Advantages by Веньхао Чжен, Вікторія Опанасенко

    Published 2025-05-01
    “…Moreover, the use of personal data raises concerns in terms of privacy and ethical standards, which necessitates a careful balancing act between leveraging data for analysing and maintaining the users’ trust. …”
    Get full text
    Article
  16. 936

    Improved Private Data Protection Scheme for Blockchain Smart Contracts by Sheng Hu

    Published 2023-01-01
    “…To tackle these challenges and promote the development of blockchain technology, this paper presents a scheme that enhances privacy data protection in blockchain smart contracts using edge computing and a master-slave multichain architecture. …”
    Get full text
    Article
  17. 937

    Policy guidelines and recommendations on AI use in teaching and learning: A meta-synthesis study by Aaron A. Funa, Renz Alvin E. Gabay

    Published 2025-01-01
    “…Under the theme of policies and guidelines, notable subthemes include ethical AI use, AI literacy, and inclusivity and equity. In terms of implementation strategies, the synthesis identifies crucial areas such as student orientation and professional development, enhanced teaching tools and data-driven insights, improved student learning outcomes and engagement, and streamlined administrative processes. …”
    Get full text
    Article
  18. 938

    ARTIFICIAL INTELLIGENCE AND BIG DATA ANALYSIS IN CRIME PREVENTION AND COMBAT by George-Marius ȚICAL

    Published 2025-03-01
    “…In the era of accelerated digitalization, the use of artificial intelligence (AI) and big data analysis has become a necessity in crime prevention and combat. …”
    Get full text
    Article
  19. 939

    Particular qualities of evaluation of electronic card data in modern healthcare by I. R. Svechkareva, A. A. Kurylev, D. E. Shilova

    Published 2025-01-01
    “…The article discusses various aspects of the implementation and use of EHR, including technical difficulties, data privacy and security issues. …”
    Get full text
    Article
  20. 940

    The Ethics of Data and Its Governance: A Discourse Theoretical Approach by Bernd Carsten Stahl

    Published 2025-06-01
    “…Drawing on Habermas’s Theory of Communicative Action and using the example of neuro data, this paper argues that data shapes and is shaped by discourses. …”
    Get full text
    Article