Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
usedddds » useddddds (Expand Search)
useddddddds » usedddddddds (Expand Search)
use » used (Expand Search)
usedddds » useddddds (Expand Search)
useddddddds » usedddddddds (Expand Search)
use » used (Expand Search)
-
421
AI-Driven Optimization of Blockchain Scalability, Security, and Privacy Protection
Published 2025-05-01“…With the continuous development of technology, blockchain has been widely used in various fields by virtue of its decentralization, data integrity, traceability, and anonymity. …”
Get full text
Article -
422
Dynamic and efficient vehicular cloud management scheme with privacy protection
Published 2022-12-01“…The vehicular cloud (VC) formed by vehicles is used for localization processing and consumption of traffic sensing data to achieve timely intelligent traffic management.The vehicle cloud is highly dynamic, self-organizing and timely, in which the identity and location privacy of vehicle users need to be protected as this poses challenges to the vehicular cloud management.A dynamic and self-organizing vehicle cloud management scheme based on the asymmetric group key agreement protocol was designed, where the vehicle cloud is automatically formed through the self-organized group key agreement of vehicles.The group key was used to control the provision and access of vehicle cloud services, and the dynamic management of the vehicle cloud was implemented through group key update.The scheme used traceable one-time pseudonym technology to achieve anonymous authentication and conditional privacy protection of vehicle users, and the group key agreement stage only included one bilinear pair operation to achieve high efficiency.In addition, the key negotiation and update process used lightweight signatures, supporting batch verification, to achieve efficient message source authentication and integrity authentication.Then the security and efficiency of vehicle cloud communications in the self-organizing environment can be ensured.The dynamic key update mechanism of the key agreement protocol realized the dynamic joining or exiting of vehicles in the vehicle cloud, adapting to the dynamic characteristics of the vehicle cloud.Under the random oracle model and the difficult assumption of the inverse computational Diffie Hellman (ICDH) problem, it was proved that the asymmetric group key agreement scheme satisfied the selective-plaintext security.The security analysis shows that the scheme can protect the identity and location privacy of vehicle users, realize the legal tracking of malicious vehicles, and ensure the confidentiality, integrity and anti-counterfeiting of communications, as well as the forward security of vehicle cloud dynamic management.The performance comparison analysis shows that this scheme has certain advantages in communication and computing efficiency under the condition of the same function and security level.…”
Get full text
Article -
423
A Novel Approach for Differential Privacy-Preserving Federated Learning
Published 2025-01-01“…This mechanism preserves privacy both at a “curious” PS or at external eavesdroppers without compromising the performance of the final model at each client, thus mitigating the risk of inversion attacks aimed at retrieving (partially or fully) the clients’ data. …”
Get full text
Article -
424
-
425
UniFL: Accelerating Federated Learning Using Heterogeneous Hardware Under a Unified Framework
Published 2024-01-01Get full text
Article -
426
Human Behavior Analysis Using Radar Data: A Survey
Published 2024-01-01“…Transfer learning addresses issues related to data scarcity, while data fusion models integrate information from multiple sources. …”
Get full text
Article -
427
-
428
The secondary use of the Finnish national health data repository Kanta – opportunities and obstacles
Published 2025-05-01“…While protecting the privacy of the individuals’ data in the Kanta Services, improvements to the secondary use law are suggested. …”
Get full text
Article -
429
Federated Deep Learning Model for False Data Injection Attack Detection in Cyber Physical Power Systems
Published 2024-10-01“…This approach enhances both detection accuracy and data privacy, offering a robust solution for FDIA detection in real-world smart grid applications.…”
Get full text
Article -
430
Community views on the secondary use of general practice data: Findings from a mixed‐methods study
Published 2024-02-01“…Abstract Introduction General practice data, particularly when combined with hospital and other health service data through data linkage, are increasingly being used for quality assurance, evaluation, health service planning and research. …”
Get full text
Article -
431
A Novel Polynomial Activation for Audio Classification Using Homomorphic Encryption
Published 2025-01-01“…Audio data often contains sensitive information, raising privacy concerns when using artificial intelligence on cloud platforms. …”
Get full text
Article -
432
Anomaly detection in encrypted network traffic using self-supervised learning
Published 2025-07-01“…In this paper, we describe ET-SSL, a new approach for encrypted data anomaly detection which uses self-supervised contrastive learning to identify informative representations in flow level, statistical features like packet length; inter arrival time; flow duration and protocol metadata to Detect anomalies in encrypted network traffic without the need for labelled datasets or payload analysis. …”
Get full text
Article -
433
Clinical Simulation Program for the Training of Health Profession Residents in Confidentiality and the Use of Social Networks
Published 2024-10-01“…After the course, the participants reported intending to modify their behavior when sharing patient data without their consent and with respect to how patients are informed; Conclusions: The use of advanced simulation in the training of interprofessional teams of residents is as an effective tool for initiating attitudinal change and increasing knowledge related to patient privacy and confidentiality. …”
Get full text
Article -
434
-
435
Legal grounds for police officers' body-worn cameras
Published 2025-01-01“…The use of these cameras is based on legal provisions which authorize police officers to record their actions, collect and process personal data. …”
Get full text
Article -
436
-
437
-
438
COVID-19 Tracing Apps as a Legal Problem: An Investigation of the Norwegian ‘Smittestopp’ App
Published 2021-12-01“…This raises ethical and legal questions, as these apps have the potential to be used for surveillance of the population. There is pressure to set privacy and data protection aside to allow extensive collection and processing of personal data, while the benefits of the apps remain uncertain. …”
Get full text
Article -
439
-
440
Balancing act: Europeans' privacy calculus and security concerns in online CSAM detection
Published 2025-01-01“…This study examines privacy calculus in online child sexual abuse material (CSAM) detection across Europe, using Flash Eurobarometer 532 data. …”
Get full text
Article