Results 11 to 20 of about 676,463 (285)

Forward Privacy Preservation in IoT-Enabled Healthcare Systems

open access: yesIEEE Transactions on Industrial Informatics, 2022
IoT-enabled smart healthcare systems has the characteristics of heterogeneous fusion, cross domain, collaborative autonomy, dynamic change and open interconnection, but they bring huge challenges in privacy issues. We proposed a scheme of forward privacy preserving for IoT-enabled healthcare systems, which mainly includes a searchable encryption scheme
Ke Wang   +5 more
openaire   +4 more sources

Survey on Privacy Protection Solutions for Recommended Applications [PDF]

open access: yesJisuanji kexue, 2021
In the context of the era of big data,various industries want to train recommendation models based on user behavior data to provide users with accurate recommendations.The common characteristics of the used data are huge amount,carrying sensitive ...
DONG Xiao-mei, WANG Rui, ZOU Xin-kai
doaj   +1 more source

Efficient Location Privacy-Aware Forwarding in Opportunistic Mobile Networks [PDF]

open access: yesIEEE Transactions on Vehicular Technology, 2014
This paper proposes a novel fully distributed and collaborative k-anonymity protocol (LPAF) to protect users’ location information and ensure better privacy while forwarding queries/replies to/from untrusted location-based service (LBS) over opportunistic mobile networks (OppMNets.
Zakhary, Sameh   +2 more
openaire   +3 more sources

Forward Secure Conjunctive-Keyword Searchable Encryption

open access: yesIEEE Access, 2019
Searchable symmetric encryption (SSE) has been applied in constructing secure cloud storage for its simplicity, high-efficiency, and practicality. Recent works show that forward privacy has become a fundamental property required for SSE, and several ...
Chengyu Hu   +6 more
doaj   +1 more source

Efficient dynamic searchable encryption scheme for conjunctive queries based on bidirectional index

open access: yesTongxin xuebao, 2022
To solve the problems of complicated operation, information leakage, and inflexible query method in the update process of existing dynamic searchable encryption scheme, an efficient dynamic searchable encryption scheme (named BPC-DSSE) for conjunctive ...
Ruizhong DU, Yuqing ZHANG, Mingyue LI
doaj   +2 more sources

Machine-Readable Privacy Certificates for Services [PDF]

open access: yes, 2013
Privacy-aware processing of personal data on the web of services requires managing a number of issues arising both from the technical and the legal domain.
A. Cavoukian   +13 more
core   +1 more source

Improving Bitswap Privacy with Forwarding and Source Obfuscation

open access: yes2023 IEEE 48th Conference on Local Computer Networks (LCN), 2023
short paper, 4 pages, accepted as a short paper at 2023 IEEE 48th Conference on Local Computer Networks (LCN)
Daniel, Erik   +2 more
openaire   +2 more sources

Survey of big-data-analysis-resistant privacy protection

open access: yes网络与信息安全学报, 2016
Privacy protection plays a significant role in big data era for data sharing and analysis.Traditional privacy protection approaches may not apply well for big data scenarios,because there may exist deep associations which can also cause privacy leakages ...
Wei TONG,AOYun-long M,Qing-jun CEHN,Bin-ru WANG,Bao-jia ZHANG,Sheng ZHONG
doaj   +3 more sources

Re-thinking the regulatory environment of credit reporting: Could legislation stem privacy and discrimination concerns? [PDF]

open access: yes, 2006
This paper examines the activities carried out in the UK by Credit Reference Agencies, current business practices, and the legal standing of credit reporting. It suggests areas and issues for further legal debate and policy consideration.
Ferretti, F
core   +1 more source

Privacy in the Genomic Era [PDF]

open access: yes, 2015
Genome sequencing technology has advanced at a rapid pace and it is now possible to generate highly-detailed genotypes inexpensively. The collection and analysis of such data has the potential to support various applications, including personalized ...
Ayday, Erman   +7 more
core   +4 more sources

Home - About - Disclaimer - Privacy