Results 11 to 20 of about 15,311 (163)

Online Privacy Fatigue: A Scoping Review and Research Agenda

open access: yesFuture Internet, 2023
Online users are responsible for protecting their online privacy themselves: the mantra is custodiat te (protect yourself). Even so, there is a great deal of evidence pointing to the fact that online users generally do not act to preserve the privacy of ...
Karl van der Schyff   +3 more
doaj   +1 more source

Efficient dynamic searchable encryption scheme for conjunctive queries based on bidirectional index

open access: yesTongxin xuebao, 2022
To solve the problems of complicated operation, information leakage, and inflexible query method in the update process of existing dynamic searchable encryption scheme, an efficient dynamic searchable encryption scheme (named BPC-DSSE) for conjunctive ...
Ruizhong DU, Yuqing ZHANG, Mingyue LI
doaj   +2 more sources

Result-pattern-hiding Conjunctive Searchable Symmetric Encryption with Forward and Backward Privacy

open access: yesProceedings on Privacy Enhancing Technologies, 2023
Dynamic searchable symmetric encryption (DSSE) enables the data owner to outsource its database (document sets) to an untrusted server and make searches and updates securely and efficiently. Conjunctive DSSE can process conjunctive queries that return the documents containing multiple keywords.
Dandan Yuan   +3 more
openaire   +1 more source

The Latticed-Based Path Privacy Protection Aggregation Scheme for Internet of Vehicles

open access: yesIEEE Access, 2022
With the occurrence of information leakage events of online ride-hailing, the information security of Internet of Vehicles has been highly valued by the society.
Cheng Wei   +3 more
doaj   +1 more source

Efficient Short Group Signatures for Conditional Privacy in Vehicular Ad Hoc Networks via ID Caching and Timed Revocation

open access: yesIEEE Access, 2021
Vehicular Ad hoc Networks (VANETs) are a subset of the Internet of Things (IoT) that are used in smart traffic applications. Due to their high speed, mobility, and exposure to the environment, the security requirements for VANETs result in the ...
L. Ellen Funderburg, Im-Yeong Lee
doaj   +1 more source

An experiment on data sharing options designs for eHealth interventions

open access: yesInternet Interventions, 2023
Background: With eHealth technology interventions, users' personal health data can be easily shared among different stakeholders. Users should decide with whom they want to share their data.
Valentina Bartali, Lex van Velsen
doaj   +1 more source

A secure and efficient DSSE scheme with constant storage costs in smart devices

open access: yesCyber Security and Applications, 2023
With the continuous development of the Internet of Things (IOT) and cloud computing, smart devices are playing an increasingly important role in users’ daily life.
Weiwei Yan, Sai Ji
doaj   +1 more source

Dynamic Bit Encoding for Privacy Protection against Correlation Attacks in RFID Backward Channel [PDF]

open access: yesIEEE Transactions on Computers, 2013
Today Radio Frequency Identification (RFID) technologies are applied in many fields for a variety of applications. Though bringing great productivity gains, RFID systems may cause new security and privacy threats to individuals or organizations. Therefore, it is important to protect the security of RFID systems and the privacy of RFID tag owners ...
Sakai, K.   +3 more
openaire   +1 more source

JPEG Privacy and Security framework for social networking and GLAM services

open access: yesEURASIP Journal on Image and Video Processing, 2017
Current image coding standards provide limited support for privacy and security features. An exception is the JPSEC standard, which defines security extensions in JPEG 2000 specifications (part 8).
Frederik Temmermans   +6 more
doaj   +1 more source

On the Security of a Lightweight and Secure Access Authentication Scheme for Both UE and mMTC Devices in 5G Networks

open access: yesApplied Sciences, 2022
The Internet of Things (IoT) and 5G networks play important roles in the latest systems for managing and monitoring various types of data. These 5G based IoT environments collect various data in real-time using micro-sensors as IoT things devices and ...
Kisung Park, Youngho Park
doaj   +1 more source

Home - About - Disclaimer - Privacy