Results 21 to 30 of about 106,465 (133)

A novel monitoring system for fall detection in older people [PDF]

open access: yes, 2018
Indexación: Scopus.This work was supported in part by CORFO - CENS 16CTTS-66390 through the National Center on Health Information Systems, in part by the National Commission for Scientific and Technological Research (CONICYT) through the Program STIC ...
De Albuquerque, V.H.C.   +7 more
core   +1 more source

JPEG Privacy and Security framework for social networking and GLAM services

open access: yesEURASIP Journal on Image and Video Processing, 2017
Current image coding standards provide limited support for privacy and security features. An exception is the JPSEC standard, which defines security extensions in JPEG 2000 specifications (part 8).
Frederik Temmermans   +6 more
doaj   +1 more source

On the Security of a Lightweight and Secure Access Authentication Scheme for Both UE and mMTC Devices in 5G Networks

open access: yesApplied Sciences, 2022
The Internet of Things (IoT) and 5G networks play important roles in the latest systems for managing and monitoring various types of data. These 5G based IoT environments collect various data in real-time using micro-sensors as IoT things devices and ...
Kisung Park, Youngho Park
doaj   +1 more source

Building Trusted Federated Learning: Key Technologies and Challenges

open access: yesJournal of Sensor and Actuator Networks, 2023
Federated learning (FL) provides convenience for cross-domain machine learning applications and has been widely studied. However, the original FL is still vulnerable to poisoning and inference attacks, which will hinder the landing application of FL ...
Depeng Chen   +3 more
doaj   +1 more source

A Personal Privacy Data Protection Scheme for Encryption and Revocation of High-Dimensional Attribute Domains

open access: yesIEEE Access, 2023
With the frequent occurrence of private data breaches, it is now more necessary than ever to address how to protect private data. The combination of Ciphertext-Policy Attribute-Based Encryption (CP-ABE) and blockchain typically enables secure storage and
Caimei Wang   +5 more
doaj   +1 more source

Exploiting Hidden Information Leakages in Backward Privacy for Dynamic Searchable Symmetric Encryption

open access: yesApplied Sciences
Dynamic searchable symmetric encryption (DSSE) enables searches over encrypted data as well as data dynamics such as flexible data addition and deletion operations.
Hyundo Yoon   +4 more
doaj   +1 more source

Secure and Efficient Deduplication for Cloud Storage with Dynamic Ownership Management

open access: yesApplied Sciences, 2023
Cloud storage services have become indispensable in resolving the constraints of local storage and ensuring data accessibility from anywhere at any time. Data deduplication technology is utilized to decrease storage space and bandwidth requirements. This
Mira Lee, Minhye Seo
doaj   +1 more source

Quantifying Differential Privacy under Temporal Correlations

open access: yes, 2017
Differential Privacy (DP) has received increased attention as a rigorous privacy framework. Existing studies employ traditional DP mechanisms (e.g., the Laplace mechanism) as primitives, which assume that the data are independent, or that adversaries do ...
Cao, Yang   +3 more
core   +1 more source

Privacy Protection: An Anti-Fraud Scheme Based on Improved Bayesian Game Model in Multimedia Communication System

open access: yesIEEE Access, 2020
In the multimedia communication system, users are often exposed to fraud information from malicious applications (such as providing fake bids and false content), which can easily cause privacy leakage.
Rui Zhang   +4 more
doaj   +1 more source

Research on Dynamic Searchable Encryption Method Based on Bloom Filter

open access: yesApplied Sciences
Data outsourcing has become more and more popular due to its low cost and flexibility. However, there is a problem that the cloud server used to store data is partially trusted.
Ziqi Jin   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy