Results 251 to 260 of about 672,157 (285)
Some of the next articles are maybe not open access.
Protection of privacy in Bangladesh: issues, challenges and way forward
The International Journal of Human Rights, 2023Nowadays, privacy emerges as one of the most desired human rights. It is crucial for the fullest development of the physical and mental growth of human beings. Due to constant progress and subsequent usage and dependence on Information and Communications Technology in the digital age, personal data emerges as the new fuel to the Internet and coin to ...
openaire +2 more sources
ORAM Based Forward Privacy Preserving Dynamic Searchable Symmetric Encryption Schemes
Proceedings of the 2015 ACM Workshop on Cloud Computing Security Workshop, 2015In the cloud era, as more and more businesses and individuals have their data hosted by an untrusted storage service provider, data privacy has become an important concern. In this context, searchable symmetric encryption (SSE) has gained a lot of attention.
Panagiotis Rizomiliotis +1 more
openaire +1 more source
Privacy Protected Data Forwarding in Human Associated Delay Tolerant Networks
2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 2013Human associated delay-tolerant networks (HDTNs) are new networks for DTNs, where mobile devices are associated with humans and demonstrate social related communication characteristics. As most of recent works use real social trace files to study the date forwarding in HDTNs, the privacy protection becomes a serious issue.
Longxiang Gao +3 more
openaire +1 more source
Forward privacy multikeyword ranked search over encrypted database
International Journal of Intelligent Systems, 2022Shaohua Zhao +5 more
openaire +1 more source
Privacy and Digital Health: Causes for Concern and a Way Forward
Journal of Addiction MedicineDigital health technologies hold promise for addressing substance use disorder (SUD) treatment gaps but also introduce significant privacy risks, challenging patient autonomy and therapeutic trust. This commentary highlights how SUD digital health services, despite claims of “privacy” and “HIPAA compliance,” often utilize surveillance technologies that
Jonathan J.K. Stoltman, Mishka Terplan
openaire +2 more sources
Dynamic Searchable Symmetric Encryption with Forward and Backward Privacy
2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2021Yu Peng +6 more
openaire +1 more source
Sociotechnical safeguards for genomic data privacy
Nature Reviews Genetics, 2022Zhiyu Wan +2 more
exaly
Privacy-by-Design in ITS Applications : The Way Forward
2011This paper analyses how ITS applications may embrace a privacy-by-design approach. We take a holistic viewpoint based on three founding principles: data minimization, enforcement and transparency. The impact on architecture and technology is presented. Three challenges for ITS deployment are further discussed: the intrinsic instability of the resulting
Kung, Antonio +2 more
openaire +1 more source
A Comprehensive Survey of Privacy-preserving Federated Learning
ACM Computing Surveys, 2022Xuefei Yin, Yanming Zhu, Jiankun Hu
exaly

