Results 11 to 20 of about 672,157 (285)

Survey on Privacy Protection Solutions for Recommended Applications [PDF]

open access: yesJisuanji kexue, 2021
In the context of the era of big data,various industries want to train recommendation models based on user behavior data to provide users with accurate recommendations.The common characteristics of the used data are huge amount,carrying sensitive ...
DONG Xiao-mei, WANG Rui, ZOU Xin-kai
doaj   +1 more source

Efficient Location Privacy-Aware Forwarding in Opportunistic Mobile Networks [PDF]

open access: yesIEEE Transactions on Vehicular Technology, 2014
This paper proposes a novel fully distributed and collaborative k-anonymity protocol (LPAF) to protect users’ location information and ensure better privacy while forwarding queries/replies to/from untrusted location-based service (LBS) over opportunistic mobile networks (OppMNets.
Zakhary, Sameh   +2 more
openaire   +3 more sources

Forward Privacy Preservation in IoT-Enabled Healthcare Systems

open access: yesIEEE Transactions on Industrial Informatics, 2022
IoT-enabled smart healthcare systems has the characteristics of heterogeneous fusion, cross domain, collaborative autonomy, dynamic change and open interconnection, but they bring huge challenges in privacy issues. We proposed a scheme of forward privacy preserving for IoT-enabled healthcare systems, which mainly includes a searchable encryption scheme
Ke Wang   +5 more
openaire   +2 more sources

Forward Secure Conjunctive-Keyword Searchable Encryption

open access: yesIEEE Access, 2019
Searchable symmetric encryption (SSE) has been applied in constructing secure cloud storage for its simplicity, high-efficiency, and practicality. Recent works show that forward privacy has become a fundamental property required for SSE, and several ...
Chengyu Hu   +6 more
doaj   +1 more source

Improving Bitswap Privacy with Forwarding and Source Obfuscation

open access: yes2023 IEEE 48th Conference on Local Computer Networks (LCN), 2023
short paper, 4 pages, accepted as a short paper at 2023 IEEE 48th Conference on Local Computer Networks (LCN)
Daniel, Erik   +2 more
openaire   +2 more sources

The right expert at the right time and place: From expertise identification to expertise selection [PDF]

open access: yes, 2008
We propose a unified and complete solution for expert finding in organizations, including not only expertise identification, but also expertise selection functionality.
Apers, Peter   +7 more
core   +3 more sources

Efficient dynamic searchable encryption scheme for conjunctive queries based on bidirectional index

open access: yesTongxin xuebao, 2022
To solve the problems of complicated operation, information leakage, and inflexible query method in the update process of existing dynamic searchable encryption scheme, an efficient dynamic searchable encryption scheme (named BPC-DSSE) for conjunctive ...
Ruizhong DU, Yuqing ZHANG, Mingyue LI
doaj   +2 more sources

Survey of big-data-analysis-resistant privacy protection

open access: yes网络与信息安全学报, 2016
Privacy protection plays a significant role in big data era for data sharing and analysis.Traditional privacy protection approaches may not apply well for big data scenarios,because there may exist deep associations which can also cause privacy leakages ...
Wei TONG,AOYun-long M,Qing-jun CEHN,Bin-ru WANG,Bao-jia ZHANG,Sheng ZHONG
doaj   +3 more sources

Machine-Readable Privacy Certificates for Services [PDF]

open access: yes, 2013
Privacy-aware processing of personal data on the web of services requires managing a number of issues arising both from the technical and the legal domain.
A. Cavoukian   +13 more
core   +1 more source

Investigation into and Reflection of User Privacy Policies of Reading Apps [PDF]

open access: yesNongye tushu qingbao xuebao, 2021
[Purpose/Significance] As reading apps are becoming popular for they are convenient for people to read, people are also increasingly concerned about user privacy issues.
ZHANG Bin, ZHOU Yonghong
doaj   +1 more source

Home - About - Disclaimer - Privacy