-
221
Multi-authority attribute hidden for electronic medical record sharing scheme based on blockchain
Published 2022-08-01Subjects: Get full text
Article -
222
Location privacy-preserving method in LBS based on Voronoi division
Published 2015-05-01Subjects: “…location privacy…”
Get full text
Article -
223
Privacy-preserving multi-attribute reverse spectrum auction scheme
Published 2020-09-01Subjects: Get full text
Article -
224
Convolutional neural network model over encrypted data based on functional encryption
Published 2024-03-01Subjects: Get full text
Article -
225
Android application privacy protection mechanism based on virtual machine bytecode injection
Published 2021-06-01Subjects: Get full text
Article -
226
Using the Ethereum Blockchain in the Internet of Things Network for IT Diagnostics
Published 2024-09-01Subjects: Get full text
Article -
227
Provable secure ownership transfer protocol for RFID tag
Published 2015-08-01Subjects: Get full text
Article -
228
Research on Sensitive Information Protection of Carriers' Big-Data Platform
Published 2014-11-01Subjects: Get full text
Article -
229
Enhancing Democratic Processes: A Survey of DRE, Internet, and Blockchain in Electronic Voting Systems
Published 2025-01-01Subjects: Get full text
Article -
230
-
231
Research on forensics of privacy violations in cloud environment
Published 2018-01-01Subjects: Get full text
Article -
232
Privacy-preserving scheme for logistics systems based on 2D code and information hiding
Published 2017-11-01Subjects: Get full text
Article -
233
A Blockchain-Based Privacy Protection Model Under Quality Consideration in Spatial Crowdsourcing Platforms
Published 2024-01-01Subjects: Get full text
Article -
234
Workplace surveillance: examining current instruments, limitations and legal background issues
Published 2013-01-01Subjects: Get full text
Article -
235
Research on outsourcing of digital image forensics based on privacy preserving
Published 2016-08-01Subjects: “…privacy preservation…”
Get full text
Article -
236
Beyond Text Generation: Assessing Large Language Models’ Ability to Reason Logically and Follow Strict Rules
Published 2025-01-01Subjects: Get full text
Article -
237
Method of ciphertext retrieval in mobile edge computing based on block segmentation
Published 2020-07-01Subjects: Get full text
Article -
238
DAG-Based Swarm Learning Approach in Healthcare: A Survey
Published 2025-01-01Subjects: Get full text
Article -
239
Research and prospect of reversible data hiding method with contrast enhancement
Published 2016-04-01Subjects: Get full text
Article -
240
CP-ABE based users collaborative privacy protection scheme for continuous query
Published 2017-09-01Subjects: Get full text
Article