Suggested Topics within your search.
Suggested Topics within your search.
-
1961
Overview of searchable encryption research
Published 2018-07-01“…With the development of cloud computing,there is an increasing number of companies and individuals outsourcing their data to cloud server in the encrypted form to protect data security and user privacy.As a result,efficient retrieval of encrypted data stored on cloud server has become the issue that users may pay attention to.Searchable encryption (SE) is a cryptographic primitive that supports keyword search over encrypted data,and migrates the cumbersome search operation to the cloud server to utilize its vast computational resources.Reviews previous research according to the different cryptosystems used,and divides SE into two groups,that is symmetric searchable encryption and asymmetric searchable encryption.Based on this classification,first introduces a typical program,and then introduces from the two aspects of the expression of searchable encryption and security.Finally,the need-to-be-solved problems and main research directions are discussed.…”
Get full text
Article -
1962
Regulating cryptocurrencies in a post-pandemic global economy: A comparative legal analysis of the EU, the US, and Russia
Published 2025-09-01“…Drawing on a comparative analysis of Russia, the European Union, the United States, and Malta, it evaluates the effectiveness of CBDC-integrated anti-money laundering (AML) mechanisms in addressing the three key stages of illicit finance: placement, layering, and integration. Using primary sources, including pilot program data, legislative texts, and policy consultations, alongside secondary academic literature, the Study explores how design elements such as ledger visibility, programmable transaction limits, sanctions screening, and tiered privacy structures can be embedded into CBDC infrastructure. …”
Get full text
Article -
1963
Enhancing Software Sustainability: Leveraging Large Language Models to Evaluate Security Requirements Fulfillment in Requirements Engineering
Published 2025-02-01“…In the digital era, cybersecurity is integral for preserving national security, digital privacy, and social sustainability. This research emphasizes the role of non-functional equirements (NFRs) in developing secure software systems that enhance societal wellbeing by ensuring data protection, user privacy, and system robustness. …”
Get full text
Article -
1964
An Efficient Architecture for Edge AI Federated Learning With Homomorphic Encryption
Published 2025-01-01“…With the rapid growth of edge AI applications, there is an increasing demand for federated learning (FL) frameworks that are both efficient and privacy-preserving. This work introduces a robust approach that leverages homomorphic encryption (HE) to ensure data confidentiality during decentralized training. …”
Get full text
Article -
1965
Conceptualizing smart citizen as smart voter and its relationships with smart election process
Published 2025-03-01“…However, it also raises ethical concerns, such as data privacy, digital inequality, and risks of misinformation, which need careful management to sustain public trust. …”
Get full text
Article -
1966
A Survey of Machine Learning in Edge Computing: Techniques, Frameworks, Applications, Issues, and Research Directions
Published 2024-06-01“…Hot topics included big data, cloud, edge, multimedia, security, privacy, QoS, and activity recognition, while critical domains included industry, healthcare, agriculture, transportation, smart homes and cities, and assisted living. …”
Get full text
Article -
1967
Criminal Law Challenged by Crossing into Virtual Reality
Published 2025-03-01“…Due to its interactive and immersive nature virtual reality can collect and record large volumes of users' personal and sensitive information during use. This information includes behavioral patterns, interests, preferences, biometric and physiological data such as heart rate, body energy consumption, etc., which are comprehensively collected to create a complete and accurate user profile, potentially resulting in severe violations of users' mental privacy. …”
Get full text
Article -
1968
Revolutionising Educational Management with AI and Wireless Networks: A Framework for Smart Resource Allocation and Decision-Making
Published 2025-05-01“…By leveraging data-driven insights enabled by reliable wireless connectivity, institutions can make more informed decisions, use resources more effectively, and automate routine tasks. …”
Get full text
Article -
1969
Emerging technologies and applications in multimodality imaging for ischemic heart disease: current state and future of artificial intelligence
Published 2024-11-01“…Addressing regulatory and ethical challenges, such as data privacy and algorithm transparency, is crucial for the broader adoption of these advanced technologies. …”
Get full text
Article -
1970
The moderating role of personalized recommendations in the trust–satisfaction–loyalty relationship: an empirical study of AI-driven e-commerce
Published 2025-04-01“…Design/methodology/approach A quantitative research approach was used to collect data from a diverse group of e-commerce users who had interacted with AI-based recommendation systems. …”
Get full text
Article -
1971
A Review of Multimodal Interaction in Remote Education: Technologies, Applications, and Challenges
Published 2025-04-01“…Though multimodal communication may bring a historical improvement to the mode of online education, the platform still faces many issues, such as media synchronization, higher computational demand, physical adaptability, and privacy concerns. These problems demand further research in the fields of algorithm optimization, access to technology guidance, and the ethical use of big data. …”
Get full text
Article -
1972
Unleashing the Power of Wireless Communication in Healthcare by Empowering Patient Care and Connectivity: A Comprehensive Survey
Published 2025-01-01“…These challenges and opportunities include data security and privacy issues, as well as the need for a robust communication infrastructure. …”
Get full text
Article -
1973
Assessing the transferability of BERT to patient safety: classifying multiple types of incident reports
Published 2025-08-01“…For ambiguous medium and low severity levels, the F-score improvements ranged from 3.6% to 19.7% across all test datasets.Discussion Fine-tuned BERT led to improved performance, particularly in identifying rare classes and generalising effectively to unseen data, compared with small CNNs.Conclusion Fine-tuned BERT may be useful for classification tasks in patient safety where data privacy, scarcity and imbalance are common challenges.…”
Get full text
Article -
1974
Preferences and Willingness to Pay for Health App Assessments Among Health Care Stakeholders: Discrete Choice Experiment
Published 2025-05-01“… BackgroundThe adoption of high-quality health apps has been slow, despite the myriad benefits associated with their use. This is partly due to concerns regarding the effectiveness, safety, and data privacy of such apps. …”
Get full text
Article -
1975
DAMPAK PEMANFAATAN ARTIFICIAL INTELLIGENCE (AI) DALAM PERILAKU PENGAMBILAN KEPUTUSAN TERHADAP ETIKA BISNIS DAN KEBERLANJUTAN ORGANISASI
Published 2025-06-01“…In an increasingly complex and competitive business era, AI has become a strategic tool that can increase the speed, accuracy, and objectivity of data-based decision-making. However, its use also poses significant ethical challenges, such as issues of transparency, algorithmic bias, accountability, and data privacy. …”
Get full text
Article -
1976
FedBFGCN: A Graph Federated Learning Framework Based on Balanced Channel Attention and Cross-Layer Feature Fusion Convolution
Published 2025-01-01“…In addition, this framework also uses homomorphic encryption methods to enhance privacy protection and improve data security. …”
Get full text
Article -
1977
A Survey on Public Key Encryption with Keyword Search: Taxonomy and Methods
Published 2022-01-01“…Given the many benefits that cloud computing brings, organizations tend to outsource most of their data to reduce a large portion of their costs, but concern about the privacy of data is a major obstacle to outsourcing sensitive data. …”
Get full text
Article -
1978
BERTinchamps: Cost-Effective In-House Training of Language Models in French
Published 2024-12-01“…While training LMs directly inside an institution is desirable for leveraging local data and addressing data privacy concerns, this process demands a costly and complex computational infrastructure. …”
Get full text
Article -
1979
Advancements in artificial intelligence for atopic dermatitis: diagnosis, treatment, and patient management
Published 2025-12-01“…Despite challenges in data privacy and model transparency, the potential of artificial intelligence in advancing AD care is enormous, bringing the future to precision medicine and improving patient outcomes. …”
Get full text
Article -
1980
Analysis of Modernization Movements in Housing During the Early Republican Period: Karabük, Türkiye
Published 2025-04-01“…In this study, the idea that houses are not only structural products, but the structures that have become homes for humans, is approached and discussed through concepts such as spatial organization, relationality, accessibility, visibility, density of use, depth, privacy, and belonging. The Yenişehir district in Karabük province, which is thought to have been transformed into design by considering these concepts, also constitutes the focus area of the study idea in this sense. …”
Get full text
Article