-
261
Blockchain-based cross-data center anonymous and verifiable identity authentication scheme
Published 2024-04-01Subjects: Get full text
Article -
262
Attribute-based encryption schema with group signatures
Published 2019-02-01Subjects: Get full text
Article -
263
Anonymous trust management scheme of VANET based on attribute signature
Published 2023-04-01Subjects: Get full text
Article -
264
Image privacy preservation scheme based on QR code and reversible visible watermarking
Published 2019-11-01Subjects: Get full text
Article -
265
Social network user geolocating method based on weighted least squares
Published 2022-06-01Subjects: Get full text
Article -
266
Survey on anonymous authentication mechanisms of VANET
Published 2016-08-01Subjects: Get full text
Article -
267
Transfer learning for linear regression with differential privacy
Published 2024-12-01Subjects: Get full text
Article -
268
Location privacy protection for mobile social network
Published 2015-12-01Subjects: Get full text
Article -
269
Novel Bounds for Incremental Hessian Estimation With Application to Zeroth-Order Federated Learning
Published 2024-01-01Subjects: “…Data privacy…”
Get full text
Article -
270
Federated edge learning model based on multi-level proxy permissioned blockchain
Published 2024-04-01Subjects: Get full text
Article -
271
Personalized privacy protection method for group recommendation
Published 2019-09-01Subjects: Get full text
Article -
272
La surveillance globale dans un monde post-Snowden
Published 2017-09-01Subjects: Get full text
Article -
273
Privacy protection key distribution protocol for edge computing
Published 2021-02-01Subjects: Get full text
Article -
274
A Comparative Study of the Protection of Children's Image Rights in Cyberspace
Published 2024-03-01Subjects: Get full text
Article -
275
Analysis on anonymity and regulation of digital currency transactions based on game theory
Published 2022-10-01Subjects: Get full text
Article -
276
Self-sovereign management scheme of personal health record with personal data store and decentralized identifier
Published 2025-01-01Subjects: Get full text
Article -
277
Elliptic curve ElGamal encryption based location privacy-preserving scheme
Published 2020-06-01Subjects: “…location privacy protection…”
Get full text
Article -
278
Data update algorithm based on secure network coding in cloud environment
Published 2017-05-01Subjects: Get full text
Article -
279
Privacy-preserving attribute ticket scheme based on mobile terminal with smart card
Published 2022-10-01Subjects: Get full text
Article -
280
Region-based lossless data hiding with high capacity for medical images
Published 2015-01-01Subjects: Get full text
Article