Showing 521 - 540 results of 2,784 for search '(((( useddddds OR useddddds) OR useddddds) privacy data\ ) OR ( used privacy data\ ))', query time: 0.21s Refine Results
  1. 521

    A Communication-Efficient Distributed Matrix Multiplication Scheme with Privacy, Security, and Resiliency by Tao Wang, Zhiping Shi, Juan Yang, Sha Liu

    Published 2024-08-01
    “…Inspired by the application of repairing Reed–Solomon (RS) codes in distributed storage and secret sharing, we propose SDMM schemes with reduced communication overhead through the use of trace polynomials. Specifically, these schemes are designed to address three critical concerns: (i) ensuring information-theoretic privacy against collusion among servers; (ii) providing security against Byzantine servers; and (iii) offering resiliency against stragglers to mitigate computing delays. …”
    Get full text
    Article
  2. 522

    Eisdspa: An Efficient and Secure Blockchain-Based Donation Scheme With Privacy Protection and Auditability by Yong Zhou, Hong Lei, Zijian Bao

    Published 2024-01-01
    “…However, traditional donation systems, typically centralized, are prone to issues such as data redundancy, vulnerability to single-point failures, and a deficiency in transparency and traceability. …”
    Get full text
    Article
  3. 523
  4. 524

    Secure distributed data integrity auditing with high efficiency in 5G-enabled software-defined edge computing by Dengzhi Liu, Zhimin Li, Dongbao Jia

    Published 2023-12-01
    “…The auditing results of the distributed data in the proposed scheme can be used as an important basis for evaluating the trustworthiness of the edge devices. …”
    Get full text
    Article
  5. 525

    Securing face images in UAV networks using chaos and DNA cryptography approach by Saba Inam, Shamsa Kanwal, Eaman Amin, Omar Cheikhrouhou, Monia Hamdi

    Published 2025-07-01
    “…Abstract In future applications of UAVs, the frequent transmission of image data raises significant security concerns, particularly regarding the privacy of facial information. …”
    Get full text
    Article
  6. 526

    A clustering-based approach for classifying data streams using graph matching by Yuxin Du, Mingshu He, Xiaojuan Wang

    Published 2025-02-01
    “…Abstract In response to challenges such as data encryption, uneven distribution, and user privacy concerns in network traffic classification, this paper presents a clustering-based approach.In response to challenges such as data encryption, uneven distribution, and user privacy concerns in network traffic classification, this paper presents a clustering-based approach. …”
    Get full text
    Article
  7. 527
  8. 528

    Community views on the secondary use of general practice data: Findings from a mixed‐methods study by Annette J. Braunack‐Mayer, Carolyn Adams, Alberto Nettel‐Aguirre, Belinda Fabrianesi, Lucy Carolan, Justin Beilby, Felicity Flack

    Published 2024-02-01
    “…Abstract Introduction General practice data, particularly when combined with hospital and other health service data through data linkage, are increasingly being used for quality assurance, evaluation, health service planning and research. …”
    Get full text
    Article
  9. 529

    Secure and trusted data sharing in smart healthcare using blockchain and IoT integration by Soubhagya Ranjan Mallick, Srichandan Sobhanayak, Rakesh Kumar Lenkar

    Published 2025-08-01
    “…A device proxy monitors potentially vulnerable IoT devices and uses cryptography to ensure that data remains private. …”
    Get full text
    Article
  10. 530

    Effective deep learning aided vehicle classification approach using Seismic Data by Sherief Hashima, Mohamed H. Saad, Ahmad B. Ahmad, Takeshi Tsuji, Hamada Rizk

    Published 2025-07-01
    “…Our approach achieves an impressive accuracy of 99.8%, underscoring its potential for robust and precise VC in ITSs using seismic data, particularly in data-scarce scenarios. …”
    Get full text
    Article
  11. 531

    The secondary use of the Finnish national health data repository Kanta – opportunities and obstacles by Emmi Eronen, Alpo Olavi Värri, Miika Järvinen

    Published 2025-05-01
    “…While protecting the privacy of the individuals’ data in the Kanta Services, improvements to the secondary use law are suggested. …”
    Get full text
    Article
  12. 532

    ECDSA-based tamper detection in medical data using a watermarking technique by Rupa Ch, Naga Vivek K, Gautam Srivastava, Reddy Gadekallu

    Published 2024-01-01
    “…Telemedicine is a form of healthcare delivery that employs communication technology to provide medical care to patients remotely. The use of telemedicine has seen a significant increase in recent years, presenting challenges such as patient privacy, data security, the need for reliable communication technology, and the potential for misdiagnosis without a physical examination. …”
    Get full text
    Article
  13. 533

    Clinical Simulation Program for the Training of Health Profession Residents in Confidentiality and the Use of Social Networks by Alejandro Martínez-Arce, Alberto Bermejo-Cantarero, Laura Muñoz de Morales-Romero, Víctor Baladrón-González, Natalia Bejarano-Ramírez, Gema Verdugo-Moreno, María Antonia Montero-Gaspar, Francisco Javier Redondo-Calvo

    Published 2024-10-01
    “…After the course, the participants reported intending to modify their behavior when sharing patient data without their consent and with respect to how patients are informed; Conclusions: The use of advanced simulation in the training of interprofessional teams of residents is as an effective tool for initiating attitudinal change and increasing knowledge related to patient privacy and confidentiality. …”
    Get full text
    Article
  14. 534

    A Telehealth Privacy and Security Self-Assessment Questionnaire for Telehealth Providers: Development and Validation by Leming Zhou, Robert Thieret, Valerie Watzlaf, Dilhari DeAlmeida, Bambang Parmanto

    Published 2019-06-01
    “…The assessment results may be used to identify possible vulnerabilities in telehealth systems and practice or demonstrate to patients the sufficient security and privacy protection to patients’ data.…”
    Get full text
    Article
  15. 535
  16. 536

    Federated Learning-Based Load Forecasting for Energy Aggregation Service Providers by HUANG Yichuan, SONG Yuhui, JING Zhaoxia

    Published 2025-01-01
    “…However,the required forecasting data are typically scattered among different energy suppliers,and owing to data security and privacy concerns,these suppliers are often unwilling to share their data. …”
    Get full text
    Article
  17. 537

    Detecting Personally Identifiable Information Through Natural Language Processing: A Step Forward by Luca Mainetti, Andrea Elia

    Published 2025-04-01
    “…The protection of personally identifiable information (PII) is being increasingly demanded by customers and governments via data protection regulations. Private and public organizations store and exchange through the Internet a large amount of data that include the personal information of users, employees, and customers. …”
    Get full text
    Article
  18. 538

    Navigating the Digital Twin Network landscape: A survey on architecture, applications, privacy and security by Akshita Maradapu Vera Venkata Sai, Chenyu Wang, Zhipeng Cai, Yingshu Li

    Published 2024-12-01
    “…The most serious issue here is with respect to user data privacy and security because users of most applications are unaware of the data that they are sharing with these platforms and are naive in understanding the implications of the data breaches. …”
    Get full text
    Article
  19. 539

    Assessment method on protection effectiveness of differential privacy algorithms based on fuzzy influence diagram by TIAN Yuechi, LI Fenghua, ZHOU Zejun, SUN Zhe, GUO Shoukun, NIU Ben

    Published 2024-08-01
    “…Starting from five aspects—algorithm security, feasibility, privacy bias, data utility, and user experience, an indicator system was established. …”
    Get full text
    Article
  20. 540