-
1
Data aggregation based on the privacy-preserving element in wireless sensor networks
Published 2012-10-01Subjects: Get full text
Article -
2
Data processing based on the privacy-preserving vector for wireless sensor networks
Published 2015-09-01Subjects: Get full text
Article -
3
Review of semantic-based privacy-preserving approaches in LBS
Published 2016-12-01Subjects: Get full text
Article -
4
A lightweight privacy-preserving truth discovery mechanism for IoT
Published 2021-05-01Subjects: Get full text
Article -
5
Privacy-preserving mining of association rules based on paillier encryption algorithm
Published 2016-01-01Subjects: “…privacy preserving…”
Get full text
Article -
6
Anonymization algorithm based on time density for data stream
Published 2014-11-01Subjects: “…privacy preserving…”
Get full text
Article -
7
Risk assessing and privacy-preserving scheme for privacy leakage in APP
Published 2019-05-01Subjects: Get full text
Article -
8
Survey on privacy preserving techniques for blockchain
Published 2018-09-01Subjects: Get full text
Article -
9
Overview of privacy preserving in social network
Published 2016-04-01Subjects: Get full text
Article -
10
Privacy-preserving real-time road conditions monitoring scheme based on intelligent traffic
Published 2020-07-01Subjects: Get full text
Article -
11
Regulatory Bitcoin privacy-preserving mixing service
Published 2019-08-01Subjects: Get full text
Article -
12
Cloud data anonymous assured deletion approach based on blockchain
Published 2021-03-01Subjects: Get full text
Article -
13
Privacy preserving approach based on proximity privacy for numerical sensitive attributes
Published 2015-04-01Subjects: “…privacy preserving…”
Get full text
Article -
14
Provably secure social network privacy-preserving scheme
Published 2016-08-01Subjects: Get full text
Article -
15
Privacy-preserving trajectory similarity computation method
Published 2022-11-01Subjects: “…privacy-preserving…”
Get full text
Article -
16
New chameleon Hashing of secure and privacy-preserving vehicular communications
Published 2014-11-01Subjects: “…secure and privacy-preserving…”
Get full text
Article -
17
Security analysis of weighted network anonymity based on singular value decomposition
Published 2018-05-01Subjects: Get full text
Article -
18
New cross-layer reputation mechanism for mobile cloud computing
Published 2018-03-01Subjects: Get full text
Article -
19
Efficient and secure message authentication scheme for VANET
Published 2016-11-01Subjects: Get full text
Article -
20
Scalable and Privacy-Preserving Inter-AS Routing Through Machine-Learning-Based Graph Pruning
Published 2025-01-01Subjects: Get full text
Article