Results 1 to 10 of about 106,465 (133)

Forward and Backward Private Searchable Encryption for Cloud-Assisted Industrial IoT [PDF]

open access: yesSensors
In the cloud-assisted industrial Internet of Things (IIoT), since the cloud server is not always trusted, the leakage of data privacy becomes a critical problem. Dynamic symmetric searchable encryption (DSSE) allows for the secure retrieval of outsourced
Tianqi Peng   +7 more
doaj   +2 more sources

A secure group-based authentication protocol for IoVT in 5G-enabled smart transportation and road safety systems [PDF]

open access: yesScientific Reports
The Internet of Vehicular Things (IoVT) is evolving rapidly, connecting vehicles, infrastructure, and other smart systems via the Internet. This connectivity enhances safety, efficiency, and data-driven services but also introduces significant security ...
Garima Singh   +3 more
doaj   +2 more sources

Shedding Light on Blind Spot of Backward Privacy in Dynamic Searchable Symmetric Encryption

open access: yesIEEE Access, 2023
Dynamic searchable symmetric encryption (DSSE) enables users to outsource their data while retaining the capability to search and update on the encrypted database. Although various DSSE schemes have been proposed to achieve higher efficiency and stronger
Hyundo Yoon   +5 more
doaj   +1 more source

Predictors of fairness assessment for social media screening in employee selection [PDF]

open access: yesJournal of Entrepreneurship, Management and Innovation, 2023
PURPOSE: The purpose of this paper is to analyze the factors that determine the response of potential candidates to the screening of private (represented by Facebook) and professional (LinkedIn) social networking sites (SNS) for personnel selection ...
Alicja Balcerak   +2 more
doaj   +1 more source

An Improved and Secure RFID Group Tag Ownership Transfer Protocol [PDF]

open access: yesJisuanji gongcheng, 2019
Aiming at the security issues such as backward privacy leakage and violent cracking in the existing Radio Frequency Identification(RFID) group label ownership transfer protocol,an improved ownership transfer protocol is proposed.The word randomization ...
YIN Shoujun
doaj   +1 more source

A Fast Method for Protecting Users’ Privacy in Image Hash Retrieval System

open access: yesMachines, 2022
Effective search engines based on deep neural networks (DNNs) can be used to search for many images, as is the case with the Google Images search engine. However, the illegal use of search engines can lead to serious compromises of privacy.
Liang Huang   +3 more
doaj   +1 more source

A Privacy-Preserving Key Management Scheme with Support for Sybil Attack Detection in VANETs

open access: yesSensors, 2021
Vehicular ad hoc networks (VANETs) face two important and conflicting challenges with regards to security: preserve the privacy of vehicles in order to prevent malicious entities from tracking users and detect and remove bad actors that attempt to game ...
L. Ellen Funderburg, Im-Yeong Lee
doaj   +1 more source

Online Privacy Fatigue: A Scoping Review and Research Agenda

open access: yesFuture Internet, 2023
Online users are responsible for protecting their online privacy themselves: the mantra is custodiat te (protect yourself). Even so, there is a great deal of evidence pointing to the fact that online users generally do not act to preserve the privacy of ...
Karl van der Schyff   +3 more
doaj   +1 more source

Efficient dynamic searchable encryption scheme for conjunctive queries based on bidirectional index

open access: yesTongxin xuebao, 2022
To solve the problems of complicated operation, information leakage, and inflexible query method in the update process of existing dynamic searchable encryption scheme, an efficient dynamic searchable encryption scheme (named BPC-DSSE) for conjunctive ...
Ruizhong DU, Yuqing ZHANG, Mingyue LI
doaj   +2 more sources

The Latticed-Based Path Privacy Protection Aggregation Scheme for Internet of Vehicles

open access: yesIEEE Access, 2022
With the occurrence of information leakage events of online ride-hailing, the information security of Internet of Vehicles has been highly valued by the society.
Cheng Wei   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy