Results 21 to 30 of about 2,757,418 (333)
Using User Behavior to Measure Privacy on Online Social Networks
Because social networks exemplify the phenomenon of homogeneity in complex networks, researchers generally believe that a user's privacy disclosure is closely related to that of the users around them, but we find that the related users studied in ...
Xuefeng Li +5 more
doaj +1 more source
GL-Tree: A Hierarchical Tree Structure for Efficient Retrieval of Massive Geographic Locations
Location-based application services and location privacy protection solutions are often required for the storage, management, and efficient retrieval of large amounts of geolocation data for specific locations or location intervals.
Bin Liu, Chunyong Zhang, Yang Xin
doaj +1 more source
Engaging youth in post-disaster research: Lessons learned from a creative methods approach [PDF]
Children and youth often demonstrate resilience and capacity in the face of disasters. Yet, they are typically not given the opportunities to engage in youth-driven research and lack access to official channels through which to contribute their ...
Cox, Robin S +5 more
core +3 more sources
VANET Secure Reputation Evaluation & Management Model Based on Double Layer Blockchain
Vehicle ad-hoc network (VANET) is interconnected through message forwarding and exchanging among vehicle nodes. Due to its highly dynamic topology and its wireless and heterogeneous communication mode, VANET is more vulnerable to security threats from ...
Bochuan Hou +4 more
doaj +1 more source
A Search Efficient Privacy-Preserving Location-Sharing Scheme in Mobile Online Social Networks
With the advent of intelligent handheld devices, location sharing becomes one of the most popular services in mobile online social networks (mOSNs). In location-sharing services, users can enjoy a better social experience by updating their real-time ...
Guangcan Yang +6 more
doaj +1 more source
Disasters can serve as focusing events that increase agenda attention related to issues of disaster response, recovery, and preparedness. Increased agenda attention can lead to policy changes and organisational learning.
D. Crow, Elizabeth A. Albright
semanticscholar +1 more source
Optimal Weakly Secure Minimum Storage Regenerating Codes Scheme
In a distributed storage system, regenerating codes can be utilized to ensure data availability. This reduces the repair bandwidth but increases the risk of data eavesdropping on each node.
Jianchao Bian +3 more
doaj +1 more source
An Intrusion Action-Based IDS Alert Correlation Analysis and Prediction Framework
Since the rapid development of the internet, the emergence of network intrusion has become the focus of studies for scholars and security enterprises.
Kai Zhang +4 more
doaj +1 more source
A Lightweight ID Based Authentication and Key Agreement Protocol for Multiserver Architecture
There is an increasing demand of an anonymous authentication to secure communications between numerous different network members while preserving privacy for the members.
Yanrong Lu +4 more
doaj +1 more source
In association with the September 2014 phreatic eruption (VEI 1–2) at Ontake Volcano, a syn-eruptive and two post-eruptive lahars occurred in the Akagawa–Nigorigawa River, southern flank of the volcano.
Kyoko S. Kataoka +7 more
doaj +1 more source

