Showing 2,321 - 2,340 results of 2,784 for search '"\"\\"(((\\\"use OR \\\"used)s privacy data\\\") OR ((\\\"use OR \\\"used) privacy data\\\"))\\"\""', query time: 0.48s Refine Results
  1. 2321

    Fusion of satellite-ground and inter-satellite AKA protocols for double-layer satellite networks by Jin CAO, Xiaoping SHI, Ruhui MA, Hui LI

    Published 2023-02-01
    “…With the characteristics of large space-time and satellite-ground network integration, the space integrated ground network has attracted much attention.Satellites can not only be used as emergency communication supplements, but also serve as air stations to expand the coverage of terrestrial networks, occupying an important position in both military and civilian scenarios.The entity authentication and key negotiation mechanism can prevent the malicious entities from joining the integrated network to steal users’ privacy, and guarantee network information security.In view of the characteristics of the high satellite-ground transmission delays, exposed links, limited processing capability and dynamic topology of the integrated network, a lightweight authentication scheme between satellites and ground suitable for double-layer satellite network was proposed to achieve a secure satellite networking architecture with session keys to protect data transmission.The scheme was based on symmetric cryptographic system, using lightweight cryptographic algorithms and introducing group key and hierarchical management mechanisms.The proposed scheme included three parts: inter-satellite authentication for geostationary earth orbit satellites, layer and inter-satellite authentication for same low earth orbit, and inter-satellite authentication for adjacent low earth orbit satellites.The group key and hierarchical management mechanism improved the efficiency of inter-group information transfer, reduced the authentication pressure on the ground control center, and enhanced the authentication security strength by realizing double verification in the three-entities authentication protocol.Different from the previous single scene authentication, the proposed authentication protocol took the form of multiplexing authentication parameters, which can realize the authentication requirements of dual scenes in one process.The results of Scyther, a protocol formal security simulation tool, show that the proposed scheme achieves secure access authentication.Compared with existing protocols, the proposed scheme improves authentication security and reduces communication and computational overhead.…”
    Get full text
    Article
  2. 2322

    Green banking practices and customer satisfaction-way to green sustainability by Ajaz Akbar Mir, Aijaz Ahmad Bhat, Ahmad Samed Al-Adwan, Summaira Farooq, Dima Jamali, Irshad Ahmad Malik

    Published 2025-04-01
    “…The study identified four pivotal variables and examined how digital banking, green infrastructure, green loans and services affect consumer satisfaction in select public and private sector banks. The study used cluster sampling technique and sample was taken systematically from each cluster selected using a comprehensive research framework. …”
    Get full text
    Article
  3. 2323

    Comparative Study of Blockchain Hashing Algorithms with a Proposal for HashLEA by Abdullah Sevin, Abdu Ahmed Osman Mohammed

    Published 2024-12-01
    “…Blockchain has several unique features: data integrity, security, privacy, and immutability. …”
    Get full text
    Article
  4. 2324

    Enhancing IoT Security in 5G Networks by Reem Alzhrani, Mohammed Alliheedi

    Published 2024-12-01
    “…We constructed the 5G network infrastructure using OMNeT++ with the INET and Simu5G frameworks. …”
    Get full text
    Article
  5. 2325

    SCRHM: A Secure Continuous Remote Health Monitoring System by Qiuxiang Dong, Zhi Guan, Kunlun Gao, Zhong Chen

    Published 2015-12-01
    “…With this scheme, remote health monitoring service provider is able to detect outliers over encrypted health parameters. Using analysis, we prove the correctness and security of the proposed scheme on privacy protection of users’ health data. …”
    Get full text
    Article
  6. 2326

    FLavourite: Horizontal and Vertical Federated Learning Setting Comparison by Walter Riviera, Ilaria Boscolo Galazzo, Gloria Menegaz

    Published 2025-01-01
    “…We assess the classification of Alzheimer’s disease using non-independent and identically distributed (non-i.i.d.) 3D images and tabular data. …”
    Get full text
    Article
  7. 2327

    AML-Based Multi-Dimensional Co-Evolution Approach Supported by Blockchain: Architecture Design and Case Study on Intelligent Production Lines for Industry 4.0 by Kai Ding, Detlef Gerhard, Liuqun Fan

    Published 2025-03-01
    “…As a transparent decentralized network, blockchain’s compatibility with the challenges of AML collaboration processes, data security, and privacy is not ideal. This paper proposes a new method to enhance the collaborative evolution of IPLs. …”
    Get full text
    Article
  8. 2328

    Access to information in the context of virtual space in the legal system of Iran and United States by Hedieh sadat Mirtorabi, Mojtaba Ansarian

    Published 2025-03-01
    “…In Iran, restrictions on access to information may reduce the spread of ideas and thoughts, ban potentially useful information, and cause problems in cultural development. …”
    Get full text
    Article
  9. 2329

    Public Perception on Artificial Intelligence–Driven Mental Health Interventions: Survey Research by Mahima Anna Varghese, Poonam Sharma, Maitreyee Patwardhan

    Published 2024-11-01
    “…Major concerns included data privacy, security, the lack of human touch, and the potential for misdiagnosis. …”
    Get full text
    Article
  10. 2330

    Evaluating new technologies and organizational structures by Ofira Schwartz, Michele Hayslett

    Published 2024-12-01
    “…Co-authors Knut Wenig and Xiaoyao Han are examining the findability of data deposited in data repositories that are using DDI metadata standards. …”
    Get full text
    Article
  11. 2331

    Lightweight Encryption Technique to Enhance Medical Image Security on Internet of Medical Things Applications by Mohammad Kamrul Hasan, Shayla Islam, Rossilawati Sulaiman, Sheroz Khan, Aisha-Hassan Abdalla Hashim, Shabana Habib, Mohammad Islam, Saleh Alyahya, Musse Mohamed Ahmed, Samar Kamil, Md Arif Hassan

    Published 2021-01-01
    “…Therefore, patients may lose the privacy of data contents since images are different from the text because of their two particular factors of loss of data and confidentiality. …”
    Get full text
    Article
  12. 2332

    IOT based wearable sensor system architecture for classifying human activity by V. Mahalakshmi, Pramod Kumar, Manisha Bhende, Ismail Keshta, Swatiben Yashvantbhai Rathod, Janjhyam Venkata Naga Ramesh

    Published 2025-06-01
    “…The proposed system follows a structured workflow: (i) channel state information (CSI) is extracted from ESP32 modules, (ii) data preprocessing is performed using Hampel and Gaussian filters for noise and outlier removal, (iii) dimensionality reduction is achieved through Principal Component Analysis (PCA) and Discrete Wavelet Transform (DWT), and (iv) activity classification is conducted using Dynamic Time Warping (DTW) and the K-Nearest Neighbors (KNN) algorithm. …”
    Get full text
    Article
  13. 2333

    A Self-Sovereign Identity-Based Authentication and Reputation Protocol for IoV Applications by Victor Emanuel Farias da Costa Borges, Alvaro Sobrinho, Danilo F. S. Santos, Angelo Perkusich

    Published 2025-01-01
    “…Key innovations include a lightweight proof of reputation mechanism based on multi-party computation, enabling vehicles to collaboratively assess trustworthiness using recent spatiotemporal data without compromising privacy. …”
    Get full text
    Article
  14. 2334

    Inpatient satisfaction with nursing care in a backward region: a cross-sectional study from northwestern China by Xiaoying Wang, Juxia Zhang, Limei Yang, Jiao Dai, Wenjing Shan, Jiancheng Wang

    Published 2020-09-01
    “…Objectives The aim of the study was to examine the level of patient satisfaction with nursing care and identify the factors affecting satisfaction from the inpatient’s perspective in a backward region of China.Design This was a cross-sectional study.Setting The study was conducted at a tertiary hospital located in northwest China.Participants Patients admitted to the ward for at least 48 hours were chosen to participate in the survey.Primary outcome measure The Newcastle Satisfaction with Nursing Care Scale was used. Data were collected from 219 patients.Results The overall inpatient satisfaction with nursing care was 78.15±4.74. …”
    Get full text
    Article
  15. 2335

    A Trusted Batch Authentication Mechanism Based on Tree for Power Internet of Things by Baohua ZHAO, Zhihao WANG, Liandong CHEN, Chunhui REN, Fajiang YU, Qing XU

    Published 2022-05-01
    “…The structure of unbalanced hash tree generates less verification information during device verification and protects privacy. The sparse Merkel tree multiproofs method is used to generate the verification information to implement the batch authentication of devices. …”
    Get full text
    Article
  16. 2336

    Rapid Whole-Genome Sequencing in Critically Ill Infants and Children with Suspected, Undiagnosed Genetic Diseases: Evolution to a First-Tier Clinical Laboratory Test in the Era of... by Rina Kansal

    Published 2025-03-01
    “…Factors that will help to develop rWGS as a clinical test in critically ill infants and the limitations are briefly discussed, including an evaluation of the clinical utility and accessibility of genetic testing, education for parents and providers, cost-effectiveness, ethical challenges, consent issues, secondary findings, data privacy concerns, false-positive and false-negative results, challenges in variant interpretation, costs and reimbursement, the limited availability of genetic counselors, and the development of evidence-based guidelines, which would all need to be addressed to facilitate the implementation of pediatric genomic sequencing in an effective widespread manner in the era of precision medicine.…”
    Get full text
    Article
  17. 2337

    Integrating Artificial Intelligence into Service Innovation, Business Development, and Legal Compliance: Insights from the Hainan Free Trade Port Era by Yincheng Li, Shumin Wang, Muhammad Bilawal Khaskheli

    Published 2024-10-01
    “…Hypothesis 3 state that HFTP enterprises comply with these laws while systemically assuring, in theory, and practice, the legal risks of artificial intelligence and its implications for legal regulation, which is a significant aspect of research, addressing legal risks related to data privacy, security, and algorithmic bias with many strategies being proposed. …”
    Get full text
    Article
  18. 2338

    Multimodal Cancellable Biometric Template Protection and Person Verification in Transformed Domain by Devendra Reddy Rachapalli, Venkatesulu Dondeti, Hemantha Kumar Kalluri

    Published 2024-01-01
    “…Combining biometric features increases system reliability, safety, and user privacy. We used a colorization technique to generate three separate colors Quick Response (QR) codes from a user-defined Red, Green, Blue (RGB) tuple random seed, which we then combined to create a one-way cancellable template. …”
    Get full text
    Article
  19. 2339

    Navigating the ethical terrain of AI in education: A systematic review on framing responsible human-centered AI practices by Yao Fu, Zhenjie Weng

    Published 2024-12-01
    “…Following the Preferred Reporting Items for Systematic Review and Meta-Analysis (PRISMA) guidelines, we searched Scopus and Web of Science and identified 40 empirical studies that satisfied our inclusion criteria. Specifically, we used four criteria for the screening process: (1) the study's full text was available in English; (2) the study was published before April 10th, 2024 in peer-reviewed journals or conference proceedings; (3) the study was primary research that collected original data and applied qualitative, quantitative, or mixed-methods as the study methodology; and (4) the study had a clear focus on ethical and/or responsible AI in one or multiple educational context(s). …”
    Get full text
    Article
  20. 2340