Showing 1,881 - 1,900 results of 2,784 for search '"\"((\\"use privacy data\\") OR ((\\"uses OR \"used) privacy data\\"))~\""', query time: 0.18s Refine Results
  1. 1881

    Secure deduplication and integrity audit system based on convergent encryption for cloud storage by Xiao-yong GUO, An-min FU, Bo-yu KUANG, Wei-jia DING

    Published 2017-11-01
    “…Cloud storage applications quickly become the best choice of the personal user and enterprise storage with its convenience,scalability and other advantages,secure deduplication and integrity auditing are key issues for cloud storage.At first,convergent key encapsulation/decoupling algorithm based on blind signature was set up,which could securely store key and enable it to deduplicate.Besides,a BLS signature algorithm based on convergence key was provided and use TTP to store public key and proxy audit which enables signature and pubic key deduplication and reduces client storage and computing overhead.Finally,cloud-based secure deduplicaion and integrity audit system was designed and implemented.It offered user with data privacy protection,deduplication authentication,audit authentication services and lowered client and cloud computation overhead.…”
    Get full text
    Article
  2. 1882

    Law Enforcement of Cybercrime: Tracking Digital Footprints of Cross-Border Hackers by Idham Qrida Nusa, Bambang Sugiri, Yuliati Yuliati, Faizin Sulistio

    Published 2025-06-01
    “…The analysis highlights the use of cloud storage as a media to store the proceeds of crime, in the form of data privacy. …”
    Get full text
    Article
  3. 1883

    Towards Tamper-Proof Trust Evaluation of Internet of Things Nodes Leveraging IOTA Ledger by Assiya Akli, Khalid Chougdali 

    Published 2025-07-01
    “…To overcome these obstacles, this study offers a novel approach for evaluating trust that uses IOTA Tangle technology. By decentralizing the trust evaluation process, our approach reduces the risks related to centralized solutions, including privacy violations and single points of failure. …”
    Get full text
    Article
  4. 1884

    A balancing act: exploring ethical and legal concerns associated with release of personal information in alert systems for missing persons with dementia by Adebusola Adekoya, Christine Daum, Antonio Miguel-Cruz, Lili Liu

    Published 2025-05-01
    “…We conducted a thematic analysis of the interview data to inductively explore ethical and legal concerns. …”
    Get full text
    Article
  5. 1885

    Integrating Machine Learning and IoT for Effective Plant Disease Management by Bhoi Manjulata, Dubey Ahilya

    Published 2025-01-01
    “…Further, the framework is structured for privacy of data and security using strong encryption and secure access protocols. …”
    Get full text
    Article
  6. 1886

    Platform framework for blockchain-enhanced healthcare AIoT systems by Minhee Jun

    Published 2025-04-01
    “…Theoretical analysis demonstrates that the use of a sharding blockchain significantly enhances memory efficiency and reduces data retrieval time in healthcare AIoT applications. …”
    Get full text
    Article
  7. 1887

    Regulating cryptocurrencies in a post-pandemic global economy: A comparative legal analysis of the EU, the US, and Russia by Lana Stern

    Published 2025-09-01
    “…Drawing on a comparative analysis of Russia, the European Union, the United States, and Malta, it evaluates the effectiveness of CBDC-integrated anti-money laundering (AML) mechanisms in addressing the three key stages of illicit finance: placement, layering, and integration. Using primary sources, including pilot program data, legislative texts, and policy consultations, alongside secondary academic literature, the Study explores how design elements such as ledger visibility, programmable transaction limits, sanctions screening, and tiered privacy structures can be embedded into CBDC infrastructure. …”
    Get full text
    Article
  8. 1888

    Enhancing Software Sustainability: Leveraging Large Language Models to Evaluate Security Requirements Fulfillment in Requirements Engineering by Ahmad F. Subahi

    Published 2025-02-01
    “…In the digital era, cybersecurity is integral for preserving national security, digital privacy, and social sustainability. This research emphasizes the role of non-functional equirements (NFRs) in developing secure software systems that enhance societal wellbeing by ensuring data protection, user privacy, and system robustness. …”
    Get full text
    Article
  9. 1889

    An Efficient Architecture for Edge AI Federated Learning With Homomorphic Encryption by Dadmehr Rahbari, Masoud Daneshtalab, Maksim Jenihhin

    Published 2025-01-01
    “…With the rapid growth of edge AI applications, there is an increasing demand for federated learning (FL) frameworks that are both efficient and privacy-preserving. This work introduces a robust approach that leverages homomorphic encryption (HE) to ensure data confidentiality during decentralized training. …”
    Get full text
    Article
  10. 1890

    Dual defense: Combining preemptive exclusion of members and knowledge distillation to mitigate membership inference attacks by Jun Niu, Peng Liu, Chunhui Huang, Yangming Zhang, Moxuan Zeng, Kuo Shen, Yangzhong Wang, Suyu An, Yulong Shen, Xiaohong Jiang, Jianfeng Ma, He Wang, Gaofei Wu, Anmin Fu, Chunjie Cao, Xiaoyan Zhu, Yuqing Zhang

    Published 2025-01-01
    “…Membership inference (MI) attacks threaten user privacy through determining if a given data example has been used to train a target model. …”
    Get full text
    Article
  11. 1891

    A Survey of Machine Learning in Edge Computing: Techniques, Frameworks, Applications, Issues, and Research Directions by Oumayma Jouini, Kaouthar Sethom, Abdallah Namoun, Nasser Aljohani, Meshari Huwaytim Alanazi, Mohammad N. Alanazi

    Published 2024-06-01
    “…Hot topics included big data, cloud, edge, multimedia, security, privacy, QoS, and activity recognition, while critical domains included industry, healthcare, agriculture, transportation, smart homes and cities, and assisted living. …”
    Get full text
    Article
  12. 1892

    Examining Factors Impacting Online Survey Response Rates in Educational Research: Perceptions of Graduate Students by Amany Saleh, Krishna Bista

    Published 2017-09-01
    “…The authors used descriptive statistics (percentage, average mean) and inferential statistics (chi-square and correlations) to report the data analysis and findings. …”
    Get full text
    Article
  13. 1893

    How do strategic attributes of electronic commerce impel the perceived value and electronic loyalty of online food delivery applications (OFDAs) by Muhammad Asif Zaheer, Tanveer Muhammad Anwar, Zoia Khan, Muhammad Ali Raza, Hira Hafeez

    Published 2024-08-01
    “…Design/methodology/approach – The study was quantitative and data were collected from 509 consumers of the district of Rawalpindi, Punjab Pakistan by using a convenience sampling technique who was the users of OFDAs to evaluate the proposed research model. …”
    Get full text
    Article
  14. 1894

    HIV Self-Testing among Men Who Have Sex with Men (MSM) in the UK: A Qualitative Study of Barriers and Facilitators, Intervention Preferences and Perceived Impacts. by T Charles Witzel, Alison J Rodger, Fiona M Burns, Tim Rhodes, Peter Weatherburn

    Published 2016-01-01
    “…The window period was the most important element of an HIVST, with strong preference for 4th generation testing. Kits which used a blood sample were more popular than those using saliva due to higher perceived accuracy although phobia of needles and/or blood meant some would only access HIVST if a saliva sample option was available. …”
    Get full text
    Article
  15. 1895
  16. 1896

    The Intersection of AI, Ethics, and Journalism: Greek Journalists’ and Academics’ Perspectives by Panagiota (Naya) Kalfeli, Christina Angeli

    Published 2025-01-01
    “…Regarding ethical concerns, there is evident skepticism and caution among journalists and academics about issues, such as, data bias, transparency, privacy, and copyright, which are further intensified by the absence of a regulatory framework.…”
    Get full text
    Article
  17. 1897

    Exploring internal challenges and coping strategies in online English learning via Google Meet: A study of 7th grade students in Yogyakarta by Bambang Widi Pratolo, Liza Beliarita, Naif Daifullah Alsulami

    Published 2024-10-01
    “…Data were collected through interviews and documentation, with pseudonyms used to protect students' privacy. …”
    Get full text
    Article
  18. 1898

    Exploring the Barriers and Facilitators to Implementing a Smartphone App for Physicians to Improve the Management of Acute Myocardial Infarctions: Multicenter, Mixed Methods, Obser... by Katelyn J Cullen, Hassan Mir, Madhu K Natarajan, Marija Corovic, Karen Mosleh, Jacob Crawshaw, Mathew Mercuri, Hassan Masoom, JD Schwalm

    Published 2025-07-01
    “…The surveys identified key barriers around technology, privacy, and access to required Wi-Fi that needed to be addressed during app implementation to facilitate uptake and use. …”
    Get full text
    Article
  19. 1899

    Improving the Accuracy of mmWave Radar for Ethical Patient Monitoring in Mental Health Settings by Colm Dowling, Hadi Larijani, Mike Mannion, Matt Marais, Simon Black

    Published 2024-09-01
    “…Our solution uses an unscented Kalman filter for target tracking over time and analyses features of movement to determine whether targets are human or not. …”
    Get full text
    Article
  20. 1900

    The Influence of Fintech on the National Security System: Law, Economic Potential and Digital Defense Strategy by Ngasiman Djoyonegoro, Muhammad Noor Harisudin, Hariyanto Hariyanto

    Published 2025-06-01
    “…Governments need to implement stringent regulations to safeguard Fintech user data and privacy and closely supervise Fintech operations to mitigate the risks of financial technology misuse. …”
    Get full text
    Article