Results 21 to 30 of about 106,465 (133)
A novel monitoring system for fall detection in older people [PDF]
Indexación: Scopus.This work was supported in part by CORFO - CENS 16CTTS-66390 through the National Center on Health Information Systems, in part by the National Commission for Scientific and Technological Research (CONICYT) through the Program STIC ...
De Albuquerque, V.H.C. +7 more
core +1 more source
JPEG Privacy and Security framework for social networking and GLAM services
Current image coding standards provide limited support for privacy and security features. An exception is the JPSEC standard, which defines security extensions in JPEG 2000 specifications (part 8).
Frederik Temmermans +6 more
doaj +1 more source
The Internet of Things (IoT) and 5G networks play important roles in the latest systems for managing and monitoring various types of data. These 5G based IoT environments collect various data in real-time using micro-sensors as IoT things devices and ...
Kisung Park, Youngho Park
doaj +1 more source
Building Trusted Federated Learning: Key Technologies and Challenges
Federated learning (FL) provides convenience for cross-domain machine learning applications and has been widely studied. However, the original FL is still vulnerable to poisoning and inference attacks, which will hinder the landing application of FL ...
Depeng Chen +3 more
doaj +1 more source
With the frequent occurrence of private data breaches, it is now more necessary than ever to address how to protect private data. The combination of Ciphertext-Policy Attribute-Based Encryption (CP-ABE) and blockchain typically enables secure storage and
Caimei Wang +5 more
doaj +1 more source
Dynamic searchable symmetric encryption (DSSE) enables searches over encrypted data as well as data dynamics such as flexible data addition and deletion operations.
Hyundo Yoon +4 more
doaj +1 more source
Secure and Efficient Deduplication for Cloud Storage with Dynamic Ownership Management
Cloud storage services have become indispensable in resolving the constraints of local storage and ensuring data accessibility from anywhere at any time. Data deduplication technology is utilized to decrease storage space and bandwidth requirements. This
Mira Lee, Minhye Seo
doaj +1 more source
Quantifying Differential Privacy under Temporal Correlations
Differential Privacy (DP) has received increased attention as a rigorous privacy framework. Existing studies employ traditional DP mechanisms (e.g., the Laplace mechanism) as primitives, which assume that the data are independent, or that adversaries do ...
Cao, Yang +3 more
core +1 more source
In the multimedia communication system, users are often exposed to fraud information from malicious applications (such as providing fake bids and false content), which can easily cause privacy leakage.
Rui Zhang +4 more
doaj +1 more source
Research on Dynamic Searchable Encryption Method Based on Bloom Filter
Data outsourcing has become more and more popular due to its low cost and flexibility. However, there is a problem that the cloud server used to store data is partially trusted.
Ziqi Jin +3 more
doaj +1 more source

