Showing 841 - 860 results of 2,784 for search '(((( useddds OR useddddds) OR useddddds) privacy data\ ) OR ( used privacy data\ ))', query time: 0.21s Refine Results
  1. 841

    Promoting Awareness of Data Confidentiality and Security During the COVID-19 Pandemic in a Low-Income Country—Sierra Leone by Joseph Sam Kanu, Mohamed A. Vandi, Brima Bangura, Katherine Draper, Yelena Gorina, Monique A. Foster, Jadnah D. Harding, Eric N. Ikoona, Amara Jambai, Mohamed A. M. Kamara, Daniel Kaitibi, Daphne B. Moffett, Tushar Singh, John T. Redd

    Published 2024-11-01
    “…ObjectivesWorld Health Organization issued Joint Statement on Data Protection and Privacy in the COVID-19 Response stating that collection of vast amounts of personal data may potentially lead to the infringement of fundamental human rights and freedoms. …”
    Get full text
    Article
  2. 842

    Balancing Risks and Opportunities: Data-Empowered-Health Ecosystems by Lan Li, Emma Back, Suna Lee, Rebecca Shipley, Néo Mapitse, Stefan Elbe, Melanie Smallman, James Wilson, Ifat Yasin, Geraint Rees, Ben Gordon, Virginia Murray, Stephen L Roberts, Anna Cupani, Patty Kostkova

    Published 2025-03-01
    “…However, efforts to meet this need face risks related to privacy, data protection, security, democratic governance, and exclusion. …”
    Get full text
    Article
  3. 843

    Private Data Leakage in Federated Contrastive Learning Networks by Kongyang Chen, Wenfeng Wang, Zixin Wang, Yao Huang, Yatie Xiao, Wangjun Zhang, Zhipeng Li, Zhefei Guo, Zhucheng Luo, Lin Yin, Haiyan Mai, Xiaoying Wang, Qintai Yang

    Published 2025-01-01
    “…Generally, Federated Contrastive Learning (FCL) represents an emerging approach for learning from decentralized unlabeled data while upholding data privacy. In FCL, participant clients collaborate in learning a global encoder using unlabeled data, which can serve as a versatile feature extractor for diverse downstream tasks. …”
    Get full text
    Article
  4. 844

    Best practices for clinical trials data harmonization and sharing on NHLBI bioData catalyst (BDC) learned from CONNECTS network COVID-19 studies by Jeran K. Stratford, Huaqin Helen Pan, Alex Mainor, Edvin Music, Joshua Froess, Alex C. Cheng, Alexandra Weissman, David T. Huang, Elizabeth C. Oelsner, Sonia M. Thomas

    Published 2025-01-01
    “…Responsible data-sharing requires addressing challenges associated with data privacy and confidentiality, data linkage, data quality, variable harmonization, data formats, and comprehensive metadata documentation to produce a high-quality, contextually rich, findable, accessible, interoperable, and reusable (FAIR) dataset. …”
    Get full text
    Article
  5. 845

    Verifiable computation scheme of batch matrix multiplication based on triple perturbation and linear combination by ZHANG Tianpeng, REN Zhiyu, DU Xuehui, WANG Haichao

    Published 2024-04-01
    “…At present, the sparse matrix multiplication encryption method is used to protect the privacy of data in the matrix multiplication verifiable calculation scheme. …”
    Get full text
    Article
  6. 846

    Lightweight Block and Stream Cipher Algorithm: A Review by Suaad Ali Abead, Nada Hussein M. Ali

    Published 2024-06-01
    “…Fortunately, various lightweight encryption algorithms could be used to increase defense against various attacks to preserve the privacy and integrity of such applications. …”
    Get full text
    Article
  7. 847

    Multi-dimensional secure query scheme for fog-enhanced IIoT by Yousheng ZHOU, Chang TAN, Fei TANG

    Published 2020-08-01
    “…In view of the fact that most of the existing range query schemes for fog-enhanced IoT cannot achieve both multi-dimensional query and privacy protection,a privacy-preserving multi-dimensional secure query scheme for fog-enhanced IIoT was proposed.Firstly,the multiple ranges to be queried were mapped into a certain query matrix.Then,auxiliary vectors were constructed to decompose the query matrix,and then the auxiliary vector was processed by BGN homomorphic encryption to form a query trapdoor.Finally,with the homomorphic computation utilized by an IoT device terminal,the query trapdoor could be matched to its sensor data.Spatial complexity could be effectively reduced with the used specific auxiliary vectors.The confidentiality of sensor data could be ensured and the privacy of user’s query mode could be protected by the homomorphic encryption property.Experiments results show that the computational and communication costs are relatively low.…”
    Get full text
    Article
  8. 848
  9. 849

    Two-party cooperative blind signature based on SM2 by Xue BAI, Baodong QIN, Rui GUO, Dong ZHENG

    Published 2022-12-01
    “…SM2, issued by China in 2010, is a public key cryptography standard based on elliptic curves.It has been widely used in finance, social security and other fields thanks to its advantages of improved signature efficiency, decreased storage space and computing complexity than RSA.With the popularization and application of SM2, the issues of its key security and data privacy are of great concern.The single-key mode inhibits the potential application in multi-user settings, and the leakage of the key will threaten the security of the entire cryptosystem due to the centralization.The problem of secure storage and reasonable utilization of keys needs to be solved urgently.In addition, the SM2 digital signature algorithm cannot guarantee the message privacy.Aiming at the issues of key security and data privacy of the signature algorithm, many researchers have proposed the idea of cooperative signature and blind signature for SM2.However, there isn’t SM2 collaborative blind signature scheme proposed.Then a two-party cooperative blind signing protocol based on SM2 was proposed in this paper, which allowed two parties to sign except the user.The signing process did not require recovering the complete private key, while not revealing the information of the partial private key and secret number.The key was stored separately to improve the security of the key, while the blind signature protected the privacy of the message.In terms of security, the protocol satisfied unforgeability and unlinkability.The protocol was implemented using C to demonstrate the efficiency of each participant’s local operation.In the honest model, the time cost of each entity in the cooperative signature phase was similar as that of executing a lightweight SM2 blind signature.Overall, the proposed protocol has certain advantages in terms of function and efficiency.…”
    Get full text
    Article
  10. 850

    Balancing Innovation and Ethics by Anisa Patel

    Published 2025-03-01
    “…Opponents also point out privacy concerns and insufficient consumer data protection.  …”
    Get full text
    Article
  11. 851

    Balancing Innovation and Ethics by Anisa Patel

    Published 2025-03-01
    “…Opponents also point out privacy concerns and insufficient consumer data protection.  …”
    Get full text
    Article
  12. 852

    Data analysis in the healthcare context: a smart cities perspective by Fabiane Florencio de Souza, Alana Corsi, Clayton Pereira de Sá, Regina Negri Pagani, João Luiz Kovaleski

    Published 2023-09-01
    “…For this, a bibliographic review was carried out, using the Methodi Ordinatio methodology, resulting in a portfolio of articles with scientific relevance, which was the source of data collection and analysis. …”
    Get full text
    Article
  13. 853
  14. 854

    Addressing the gap in health data management skills: an online self-guided course for researchers and health professionals by Naomi Waithira, Brian Mutinda, Kehkashan Shah, Evelyne Kestelyn, Susan Bull, Liam Boggs, Trudie Lang, Phaik Yeong Cheah

    Published 2024-11-01
    “…This gap is pronounced in low- and middle-income countries (LMICs), where data privacy concerns and inadequate infrastructure hinder efforts to utilise and share health data. …”
    Get full text
    Article
  15. 855
  16. 856

    Understanding user’s identifiability on social media: a supervised machine learning and self-reporting investigation by Xi Chen, Hao Ding, Jian Mou, Yuping Zhao

    Published 2025-09-01
    “…The relationship between machine-predicted and self-reported identifiability was tested using data from 91 participants. Based on the degree of deviation between the two, users can be divided into four categories—normal, conservative, active, and atypical—which reflect their sensitivity to privacy concerns and preferences regarding information disclosure. …”
    Get full text
    Article
  17. 857

    A Study on Factors Affecting the Continuance Usage Intention of Social Robots with Episodic Memory: A Stimulus–Organism–Response Perspective by Yi Yang, Hye-Kyung Cho, Min-Yong Kim

    Published 2025-05-01
    “…A structural model incorporating key perceived features (intimacy, morality, dependency, and information privacy risk) was tested with survey data from 285 MOCCA users and analyzed using Partial Least Squares Structural Equation Modeling (PLS-SEM). …”
    Get full text
    Article
  18. 858

    #BeSeen: understanding young people’s views of the motivation and impacts of sharing self-harm imagery online and use of their social media data for research—a UK participatory art... by Ann John, Ashrafunnesa Khanom, Todd Smith, Amanda Marchant, Dana Dekel, Harley Morgan, Sarah Tombs, Karen Ingham

    Published 2024-07-01
    “…Participants from the RAS group were more inclined to agree to their data being used and had higher levels of trust in government.Conclusion Young people care about their privacy and use of their data even when it is publicly available. …”
    Get full text
    Article
  19. 859

    When Digital Economy Meets Web3.0: Applications and Challenges by Chuan Chen, Lei Zhang, Yihao Li, Tianchi Liao, Siran Zhao, Zibin Zheng, Huawei Huang, Jiajing Wu

    Published 2022-01-01
    “…In the digital economy scenario, the centralized nature of the Internet and other characteristics usually bring about security issues such as infringement and privacy leakage. Therefore, it is necessary to investigate how to use Web3.0 technologies to solve the pain points encountered in the development of the digital economy by fully exploring the critical technologies of digital economy and Web3.0. …”
    Get full text
    Article
  20. 860

    VF-CART: A communication-efficient vertical federated framework for the CART algorithm by Yang Xu, Xuexian Hu, Jianghong Wei, Hongjian Yang, Kejia Li

    Published 2023-01-01
    “…With growing concerns about privacy and the fact that data are distributed among multiple parties in realistic scenarios, vertical federated learning (VFL) is becoming increasingly important. …”
    Get full text
    Article