-
341
Fast handover authentication scheme in 5G mobile edge computing scenarios
Published 2022-06-01Subjects: Get full text
Article -
342
Edwards curves based security authentication protocol for mobile RFID systems
Published 2014-11-01Subjects: Get full text
Article -
343
Cloud data secure deduplication scheme via role-based symmetric encryption
Published 2018-05-01Subjects: Get full text
Article -
344
Distributed user privacy preserving adjustable personalized QoS prediction model for cloud services
Published 2023-04-01Subjects: Get full text
Article -
345
Dummy location selection algorithm based on location semantics and query probability
Published 2020-03-01Subjects: Get full text
Article -
346
A Secure Data Sharing Model Utilizing Attribute-Based Signcryption in Blockchain Technology
Published 2024-12-01Subjects: Get full text
Article -
347
An efficient lattice‐based threshold signature scheme using multi‐stage secret sharing
Published 2021-01-01Subjects: Get full text
Article -
348
Generate medical synthetic data based on generative adversarial network
Published 2022-03-01Subjects: Get full text
Article -
349
Recent advances of privacy-preserving machine learning based on (Fully) Homomorphic Encryption
Published 2025-01-01Subjects: Get full text
Article -
350
Privacy enhancing method for dummy-based privacy protection with continuous location-based service queries
Published 2016-07-01Subjects: Get full text
Article -
351
Copyright protection algorithm based on differential privacy deep fake fingerprint detection model
Published 2022-09-01Subjects: Get full text
Article -
352
Location privacy protection method based on lightweight K-anonymity incremental nearest neighbor algorithm
Published 2023-06-01Subjects: Get full text
Article -
353
Research on LBS privacy preservation based on pseudorandom permutation in road network
Published 2017-06-01Subjects: Get full text
Article -
354
Research prospects of user information detection from encrypted traffic of mobile devices
Published 2021-02-01Subjects: Get full text
Article -
355
Aggregated privacy-preserving auditing for cloud data integrity
Published 2015-10-01Subjects: Get full text
Article -
356
Conditions for anonymity in some generic public-key encryption constructions
Published 2009-01-01Subjects: Get full text
Article -
357
Research on batch anonymous authentication scheme for VANET based on bilinear pairing
Published 2017-06-01Subjects: Get full text
Article -
358
Clustering-based dynamic privacy preserving method for social networks
Published 2015-11-01Subjects: Get full text
Article -
359
Editorial: Protecting privacy in neuroimaging analysis: balancing data sharing and privacy preservation
Published 2025-01-01Subjects: Get full text
Article -
360
PCPIR-V:parallel privacy protected algorithms for nearest neighbor query based on Spark
Published 2016-05-01Subjects: “…query privacy protection,…”
Get full text
Article