Search alternatives:
\\"uses » \\"use (Expand Search)
Showing 341 - 360 results of 2,784 for search '"\"((\\"used privacy data\\") OR ((\\"useds OR \\"uses) privacy data\\"))~\""', query time: 0.17s Refine Results
  1. 341

    Securing face images in UAV networks using chaos and DNA cryptography approach by Saba Inam, Shamsa Kanwal, Eaman Amin, Omar Cheikhrouhou, Monia Hamdi

    Published 2025-07-01
    “…Abstract In future applications of UAVs, the frequent transmission of image data raises significant security concerns, particularly regarding the privacy of facial information. …”
    Get full text
    Article
  2. 342

    A clustering-based approach for classifying data streams using graph matching by Yuxin Du, Mingshu He, Xiaojuan Wang

    Published 2025-02-01
    “…Abstract In response to challenges such as data encryption, uneven distribution, and user privacy concerns in network traffic classification, this paper presents a clustering-based approach.In response to challenges such as data encryption, uneven distribution, and user privacy concerns in network traffic classification, this paper presents a clustering-based approach. …”
    Get full text
    Article
  3. 343
  4. 344
  5. 345

    On the edge of glory (…or catastrophe): regulation, transparency and party democracy in data-driven campaigning in Québec by Eric Montigny, Philippe Dubois, Thierry Giasson

    Published 2019-12-01
    “…They have all massively integrated data-driven campaigning practices. This article identifies factors that could explain the increasing pressure to regulate Québec’s political parties’ uses of large sets of digital voter information. …”
    Get full text
    Article
  6. 346

    “By browsing this site, you accept cookies”: Research on the cookie usage permissions of news sites in Türkiye by Murat Uluk

    Published 2023-06-01
    “…Particularly in recent years, increasing awareness levels about personal data, digital privacy studies, and legal regulations have raised concerns about the use of cookies. …”
    Get full text
    Article
  7. 347

    Prexion: Probabilistic Matching-Based Compression to Mitigate Compression Side Channel Attacks Against HTTPS by Hyoungshick Kim, Sangwon Hyun

    Published 2025-01-01
    “…Web servers typically use data compression and encryption to optimize data transmission and protect user privacy. …”
    Get full text
    Article
  8. 348

    Secure and trusted data sharing in smart healthcare using blockchain and IoT integration by Soubhagya Ranjan Mallick, Srichandan Sobhanayak, Rakesh Kumar Lenkar

    Published 2025-08-01
    “…A device proxy monitors potentially vulnerable IoT devices and uses cryptography to ensure that data remains private. …”
    Get full text
    Article
  9. 349

    Effective deep learning aided vehicle classification approach using Seismic Data by Sherief Hashima, Mohamed H. Saad, Ahmad B. Ahmad, Takeshi Tsuji, Hamada Rizk

    Published 2025-07-01
    “…Our approach achieves an impressive accuracy of 99.8%, underscoring its potential for robust and precise VC in ITSs using seismic data, particularly in data-scarce scenarios. …”
    Get full text
    Article
  10. 350

    The secondary use of the Finnish national health data repository Kanta – opportunities and obstacles by Emmi Eronen, Alpo Olavi Värri, Miika Järvinen

    Published 2025-05-01
    “…While protecting the privacy of the individuals’ data in the Kanta Services, improvements to the secondary use law are suggested. …”
    Get full text
    Article
  11. 351

    ECDSA-based tamper detection in medical data using a watermarking technique by Rupa Ch, Naga Vivek K, Gautam Srivastava, Reddy Gadekallu

    Published 2024-01-01
    “…Telemedicine is a form of healthcare delivery that employs communication technology to provide medical care to patients remotely. The use of telemedicine has seen a significant increase in recent years, presenting challenges such as patient privacy, data security, the need for reliable communication technology, and the potential for misdiagnosis without a physical examination. …”
    Get full text
    Article
  12. 352

    Secure K-Means Clustering Scheme for Confidential Data Based on Paillier Cryptosystem by Zhengqi Zhang, Zixin Xiong, Jun Ye

    Published 2025-06-01
    “…The protocol uses the additive homomorphism property of the Paillier cryptosystem to perform K-means clustering on the encrypted data, which ensures the confidentiality of the data during the whole calculation process. …”
    Get full text
    Article
  13. 353

    PERSONAL DATA PROTECTION ISSUE REFLECTED IN THE CASE-LAW OF THE CONSTITUTIONAL COURT OF ROMANIA by Valentina BĂRBĂȚEANU

    Published 2019-05-01
    “…Over the past few years, data privacy became more and more an issue that stirred on European level lots of debates and determined the adoption of a new set of rules, imposed with the compulsory force of a European regulation. …”
    Get full text
    Article
  14. 354

    A Set of Tools and Data Management Framework for the IoT–Edge–Cloud Continuum by Janis Judvaitis, Eduards Blumbergs, Audris Arzovs, Andris Ivars Mackus, Rihards Balass, Leo Selavo

    Published 2024-12-01
    “…The approach of the IECC Data Management Framework (DMF) introduces a novel combination of multiple easy-to-configure plugin environments using data visualization features. …”
    Get full text
    Article
  15. 355

    SAFED: secure and adaptive framework for edge-based data aggregation in IoT applications by Zaineb Naaz, Gamini Joshi, Vidushi Sharma

    Published 2025-04-01
    “…Based on requirements, the control center decrypts the aggregated data using its private key. Employing the Paillier cryptosystem for encryption and RSA for authentication, SAFED is fault-tolerant, maintaining functionality even if some IoT nodes fail. …”
    Get full text
    Article
  16. 356
  17. 357

    BeyondLife: An Open-Source Digital Will Solution for Posthumous Data Management by Xinzhang Chen, Arash Shaghaghi, Jesse Laeuchli, Salil S. Kanhere

    Published 2025-01-01
    “…Managing posthumous data is becoming an increasingly complex challenge, with many existing technical solutions proving impractical in real-world applications. …”
    Get full text
    Article
  18. 358

    Privacy-Preserving Federated Class-Incremental Learning by Jue Xiao, Xueming Tang, Songfeng Lu

    Published 2024-01-01
    “…For privacy protection, we use Bayesian differential privacy to provide more balanced privacy protection for different datasets. …”
    Get full text
    Article
  19. 359

    Wasserstein GAN for moving differential privacy protection by Enze Liu, Zhiguang Chu, Xing Zhang

    Published 2025-06-01
    “…Abstract Training machine learning models often requires large datasets, but using sensitive data for training poses risks of privacy leakage. …”
    Get full text
    Article
  20. 360

    Marketing Implications of Information Society Privacy Concerns by Gheorghe ORZAN, Călin VEGHEŞ, Cătălin SILVESTRU, Mihai ORZAN, Ramona BERE

    Published 2012-12-01
    “…The Internet has facilitated access to intimate user knowledge for both official and private agents and most of modern marketing strategies are based on a wealth of personal user data used to target its specific needs and expectations, a process that has its obvious pros and cons, which have been heavily debated intensively in both academic and social venues. …”
    Get full text
    Article