Results 261 to 270 of about 676,463 (285)
Some of the next articles are maybe not open access.
Lightweight Searchable Public-Key Encryption with Forward Privacy over IIoT Outsourced Data
IEEE Transactions on Emerging Topics in Computing, 2021Biwen Chen +2 more
exaly
Privacy-by-Design in ITS Applications : The Way Forward
2011This paper analyses how ITS applications may embrace a privacy-by-design approach. We take a holistic viewpoint based on three founding principles: data minimization, enforcement and transparency. The impact on architecture and technology is presented. Three challenges for ITS deployment are further discussed: the intrinsic instability of the resulting
Kung, Antonio +2 more
openaire +1 more source
Towards fully verifiable forward secure privacy preserving keyword search for IoT outsourced data
Future Generation Computer Systems, 2022Jia Yu, Ming Yang, Liu
exaly
A smart contracts-based searchable encryption scheme with forward privacy
Third International Conference on Computer Science and Communication Technology (ICCSCT 2022), 2022Yan Junjian +3 more
openaire +1 more source
Differential Privacy Techniques for Cyber Physical Systems: A Survey
IEEE Communications Surveys and Tutorials, 2020Muneeb Ul Hassan +2 more
exaly
Survey on Multi-Access Edge Computing Security and Privacy
IEEE Communications Surveys and Tutorials, 2021Pasika Ranaweera +2 more
exaly
Low Cost RFID Authentication Protocol with Forward Privacy
Chinese Journal of Computers, 2011openaire +1 more source
Updatable Private Set Intersection With Forward Privacy
IEEE Transactions on Information Forensics and SecurityRuochen Wang +4 more
openaire +1 more source

