-
21
Toward Privacy Preservation Using Clustering Based Anonymization: Recent Advances and Future Research Outlook
Published 2022-01-01Subjects: Get full text
Article -
22
Data Verification of Logical Pk-Anonymization with Big Data Application and Key Generation in Cloud Computing
Published 2022-01-01“…More secure than K-Anonymization, Pk-Anonymization is the area’s first randomization method. …”
Get full text
Article -
23
An Anonymous User Authentication with Key Agreement Scheme without Pairings for Multiserver Architecture Using SCPKs
Published 2013-01-01“…In this paper, we present an anonymous remote user authentication with key agreement scheme for multi-server architecture employing self-certified public keys without pairings. …”
Get full text
Article -
24
Entre rencontres et rendez-vous : stratégies marocaines de sexualité hors mariage
Published 2010-12-01Subjects: Get full text
Article -
25
-
26
Evaluating the Impact of Face Anonymization Methods on Computer Vision Tasks: A Trade-Off Between Privacy and Utility
Published 2025-01-01“…Data anonymization is an essential prerequisite that enables data sharing in a privacy-preserving manner. …”
Get full text
Article -
27
Reviving/Revising “Lycidas”: Virginia Woolf’s Elegy to Unborn Poets in A Room of One’s Own
Published 2024-12-01Subjects: Get full text
Article -
28
-
29
Corrections to “Toward Privacy Preservation Using Clustering Based Anonymization: Recent Advances and Future Research Outlook”
Published 2025-01-01“…Presents corrections to the paper, Corrections to “Toward Privacy Preservation Using Clustering Based Anonymization: Recent Advances and Future Research Outlook”.…”
Get full text
Article -
30
The declaration of adoptability situation at a crossroads
Published 2025-02-01Subjects: Get full text
Article -
31
-
32
MUKAYESELİ HUKUK VE TÜRK HUKUKU KAPSAMINDA DAVALININ BİLİN(E)MEMESİNİN DAVANIN AÇILMASI BAKIMINDAN DEĞERLENDİRİLMESİ
Published 2024-07-01Subjects: Get full text
Article -
33
Robust identification method of website fingerprinting against disturbance
Published 2024-12-01Subjects: Get full text
Article -
34
Sociological and legal aspects of authentication in social networks through passport data
Published 2022-07-01Subjects: Get full text
Article -
35
Data Security in Autonomous Driving: Multifaceted Challenges of Technology, Law, and Social Ethics
Published 2024-12-01Subjects: Get full text
Article -
36
-
37
Concept and structure of the special forces of operative-search activity
Published 2019-06-01Subjects: Get full text
Article -
38
Educational “Looking Glass”, or “They” and “We”
Published 2018-12-01Subjects: Get full text
Article -
39
Open Data Release and Privacy Concerns: Complexity in Mitigating Vulnerability with Controlled Perturbation
Published 2021-01-01“…Such anonymity-preserving algorithms argue and compete in objectivethat not only could the released anonymized data preserve privacy but also the anonymized data preserve the required level of quality. …”
Get full text
Article -
40
An Efficient and Lightweight Source Privacy Protecting Scheme for Sensor Networks Using Group Knowledge
Published 2013-04-01“…The source packet is randomly forwarded within and between the groups with elaborate design to ensure communication anonymity; furthermore, members of each group exchange encrypted traffic of constant packet length to make it difficult for the adversary to trace back. …”
Get full text
Article