Search alternatives:
useddds » usedddds (Expand Search)
useddddds » usedddddds (Expand Search)
usedds » useddds (Expand Search)
use » used (Expand Search)
Showing 421 - 440 results of 2,784 for search '(((( useddds OR useddddds) OR usedds) privacy data\ ) OR (\ use privacy data\ ))', query time: 0.23s Refine Results
  1. 421

    AI-Driven Optimization of Blockchain Scalability, Security, and Privacy Protection by Fujiang Yuan, Zihao Zuo, Yang Jiang, Wenzhou Shu, Zhen Tian, Chenxi Ye, Junye Yang, Zebing Mao, Xia Huang, Shaojie Gu, Yanhong Peng

    Published 2025-05-01
    “…With the continuous development of technology, blockchain has been widely used in various fields by virtue of its decentralization, data integrity, traceability, and anonymity. …”
    Get full text
    Article
  2. 422

    Dynamic and efficient vehicular cloud management scheme with privacy protection by Min XIAO, Tao YAO, Yuanni LIU, Yonghong HUANG

    Published 2022-12-01
    “…The vehicular cloud (VC) formed by vehicles is used for localization processing and consumption of traffic sensing data to achieve timely intelligent traffic management.The vehicle cloud is highly dynamic, self-organizing and timely, in which the identity and location privacy of vehicle users need to be protected as this poses challenges to the vehicular cloud management.A dynamic and self-organizing vehicle cloud management scheme based on the asymmetric group key agreement protocol was designed, where the vehicle cloud is automatically formed through the self-organized group key agreement of vehicles.The group key was used to control the provision and access of vehicle cloud services, and the dynamic management of the vehicle cloud was implemented through group key update.The scheme used traceable one-time pseudonym technology to achieve anonymous authentication and conditional privacy protection of vehicle users, and the group key agreement stage only included one bilinear pair operation to achieve high efficiency.In addition, the key negotiation and update process used lightweight signatures, supporting batch verification, to achieve efficient message source authentication and integrity authentication.Then the security and efficiency of vehicle cloud communications in the self-organizing environment can be ensured.The dynamic key update mechanism of the key agreement protocol realized the dynamic joining or exiting of vehicles in the vehicle cloud, adapting to the dynamic characteristics of the vehicle cloud.Under the random oracle model and the difficult assumption of the inverse computational Diffie Hellman (ICDH) problem, it was proved that the asymmetric group key agreement scheme satisfied the selective-plaintext security.The security analysis shows that the scheme can protect the identity and location privacy of vehicle users, realize the legal tracking of malicious vehicles, and ensure the confidentiality, integrity and anti-counterfeiting of communications, as well as the forward security of vehicle cloud dynamic management.The performance comparison analysis shows that this scheme has certain advantages in communication and computing efficiency under the condition of the same function and security level.…”
    Get full text
    Article
  3. 423

    A Novel Approach for Differential Privacy-Preserving Federated Learning by Anis Elgabli, Wessam Mesbah

    Published 2025-01-01
    “…This mechanism preserves privacy both at a “curious” PS or at external eavesdroppers without compromising the performance of the final model at each client, thus mitigating the risk of inversion attacks aimed at retrieving (partially or fully) the clients’ data. …”
    Get full text
    Article
  4. 424
  5. 425
  6. 426

    Human Behavior Analysis Using Radar Data: A Survey by Patrycja Miazek, Alicja Zmudzinska, Pawel karczmarek, Adam Kiersztyn

    Published 2024-01-01
    “…Transfer learning addresses issues related to data scarcity, while data fusion models integrate information from multiple sources. …”
    Get full text
    Article
  7. 427
  8. 428

    The secondary use of the Finnish national health data repository Kanta – opportunities and obstacles by Emmi Eronen, Alpo Olavi Värri, Miika Järvinen

    Published 2025-05-01
    “…While protecting the privacy of the individuals’ data in the Kanta Services, improvements to the secondary use law are suggested. …”
    Get full text
    Article
  9. 429

    Federated Deep Learning Model for False Data Injection Attack Detection in Cyber Physical Power Systems by Firdous Kausar, Sambrdhi Deo, Sajid Hussain, Zia Ul Haque

    Published 2024-10-01
    “…This approach enhances both detection accuracy and data privacy, offering a robust solution for FDIA detection in real-world smart grid applications.…”
    Get full text
    Article
  10. 430

    Community views on the secondary use of general practice data: Findings from a mixed‐methods study by Annette J. Braunack‐Mayer, Carolyn Adams, Alberto Nettel‐Aguirre, Belinda Fabrianesi, Lucy Carolan, Justin Beilby, Felicity Flack

    Published 2024-02-01
    “…Abstract Introduction General practice data, particularly when combined with hospital and other health service data through data linkage, are increasingly being used for quality assurance, evaluation, health service planning and research. …”
    Get full text
    Article
  11. 431

    A Novel Polynomial Activation for Audio Classification Using Homomorphic Encryption by Linh Nguyen, Quoc Bao Phan, Lan Zhang, Tuy Tan Nguyen

    Published 2025-01-01
    “…Audio data often contains sensitive information, raising privacy concerns when using artificial intelligence on cloud platforms. …”
    Get full text
    Article
  12. 432

    Anomaly detection in encrypted network traffic using self-supervised learning by Sadaf Sattar, Shumaila Khan, Muhammad Ismail Khan, Ainur Akhmediyarova, Orken Mamyrbayev, Dinara Kassymova, Dina Oralbekova, Janna Alimkulova

    Published 2025-07-01
    “…In this paper, we describe ET-SSL, a new approach for encrypted data anomaly detection which uses self-supervised contrastive learning to identify informative representations in flow level, statistical features like packet length; inter arrival time; flow duration and protocol metadata to Detect anomalies in encrypted network traffic without the need for labelled datasets or payload analysis. …”
    Get full text
    Article
  13. 433

    Clinical Simulation Program for the Training of Health Profession Residents in Confidentiality and the Use of Social Networks by Alejandro Martínez-Arce, Alberto Bermejo-Cantarero, Laura Muñoz de Morales-Romero, Víctor Baladrón-González, Natalia Bejarano-Ramírez, Gema Verdugo-Moreno, María Antonia Montero-Gaspar, Francisco Javier Redondo-Calvo

    Published 2024-10-01
    “…After the course, the participants reported intending to modify their behavior when sharing patient data without their consent and with respect to how patients are informed; Conclusions: The use of advanced simulation in the training of interprofessional teams of residents is as an effective tool for initiating attitudinal change and increasing knowledge related to patient privacy and confidentiality. …”
    Get full text
    Article
  14. 434
  15. 435

    Legal grounds for police officers' body-worn cameras by Milidragović Dragan, Milić Nenad, Petrović Zlatko

    Published 2025-01-01
    “…The use of these cameras is based on legal provisions which authorize police officers to record their actions, collect and process personal data. …”
    Get full text
    Article
  16. 436
  17. 437
  18. 438

    COVID-19 Tracing Apps as a Legal Problem: An Investigation of the Norwegian ‘Smittestopp’ App by Mona Naomi Lintvedt

    Published 2021-12-01
    “…This raises ethical and legal questions, as these apps have the potential to be used for surveillance of the population. There is pressure to set privacy and data protection aside to allow extensive collection and processing of personal data, while the benefits of the apps remain uncertain. …”
    Get full text
    Article
  19. 439
  20. 440

    Balancing act: Europeans' privacy calculus and security concerns in online CSAM detection by Răzvan Rughiniş, Simona-Nicoleta Vulpe, Dinu Ţurcanu, Daniel Rosner

    Published 2025-01-01
    “…This study examines privacy calculus in online child sexual abuse material (CSAM) detection across Europe, using Flash Eurobarometer 532 data. …”
    Get full text
    Article