Results 11 to 20 of about 672,157 (285)
Survey on Privacy Protection Solutions for Recommended Applications [PDF]
In the context of the era of big data,various industries want to train recommendation models based on user behavior data to provide users with accurate recommendations.The common characteristics of the used data are huge amount,carrying sensitive ...
DONG Xiao-mei, WANG Rui, ZOU Xin-kai
doaj +1 more source
Efficient Location Privacy-Aware Forwarding in Opportunistic Mobile Networks [PDF]
This paper proposes a novel fully distributed and collaborative k-anonymity protocol (LPAF) to protect users’ location information and ensure better privacy while forwarding queries/replies to/from untrusted location-based service (LBS) over opportunistic mobile networks (OppMNets.
Zakhary, Sameh +2 more
openaire +3 more sources
Forward Privacy Preservation in IoT-Enabled Healthcare Systems
IoT-enabled smart healthcare systems has the characteristics of heterogeneous fusion, cross domain, collaborative autonomy, dynamic change and open interconnection, but they bring huge challenges in privacy issues. We proposed a scheme of forward privacy preserving for IoT-enabled healthcare systems, which mainly includes a searchable encryption scheme
Ke Wang +5 more
openaire +2 more sources
Forward Secure Conjunctive-Keyword Searchable Encryption
Searchable symmetric encryption (SSE) has been applied in constructing secure cloud storage for its simplicity, high-efficiency, and practicality. Recent works show that forward privacy has become a fundamental property required for SSE, and several ...
Chengyu Hu +6 more
doaj +1 more source
Improving Bitswap Privacy with Forwarding and Source Obfuscation
short paper, 4 pages, accepted as a short paper at 2023 IEEE 48th Conference on Local Computer Networks (LCN)
Daniel, Erik +2 more
openaire +2 more sources
The right expert at the right time and place: From expertise identification to expertise selection [PDF]
We propose a unified and complete solution for expert finding in organizations, including not only expertise identification, but also expertise selection functionality.
Apers, Peter +7 more
core +3 more sources
Efficient dynamic searchable encryption scheme for conjunctive queries based on bidirectional index
To solve the problems of complicated operation, information leakage, and inflexible query method in the update process of existing dynamic searchable encryption scheme, an efficient dynamic searchable encryption scheme (named BPC-DSSE) for conjunctive ...
Ruizhong DU, Yuqing ZHANG, Mingyue LI
doaj +2 more sources
Survey of big-data-analysis-resistant privacy protection
Privacy protection plays a significant role in big data era for data sharing and analysis.Traditional privacy protection approaches may not apply well for big data scenarios,because there may exist deep associations which can also cause privacy leakages ...
Wei TONG,AOYun-long M,Qing-jun CEHN,Bin-ru WANG,Bao-jia ZHANG,Sheng ZHONG
doaj +3 more sources
Machine-Readable Privacy Certificates for Services [PDF]
Privacy-aware processing of personal data on the web of services requires managing a number of issues arising both from the technical and the legal domain.
A. Cavoukian +13 more
core +1 more source
Investigation into and Reflection of User Privacy Policies of Reading Apps [PDF]
[Purpose/Significance] As reading apps are becoming popular for they are convenient for people to read, people are also increasingly concerned about user privacy issues.
ZHANG Bin, ZHOU Yonghong
doaj +1 more source

