Results 21 to 30 of about 676,463 (285)

Localizing the Politics of Privacy in Communication and Media Research

open access: yesMedia and Communication, 2020
While previous communication and media research has largely focused on either studying privacy as personal boundary management or made efforts to investigate the structural (legal or economic) condition of privacy, we observe an emergent body of research
Johanna E. Möller, Leyla Dogruel
doaj   +1 more source

Key Agreement Between User and Drone With Forward Unlinkability in Internet of Drones

open access: yesIEEE Access, 2022
Many applications are equipped to utilize drones to provide various services to users in Internet of Drones (IoD) environments. In such applications, it is necessary to make a session key between a drone and a user to establish an authenticated and ...
Jae Yeol Jeong   +2 more
doaj   +1 more source

Investigation into and Reflection of User Privacy Policies of Reading Apps [PDF]

open access: yesNongye tushu qingbao xuebao, 2021
[Purpose/Significance] As reading apps are becoming popular for they are convenient for people to read, people are also increasingly concerned about user privacy issues.
ZHANG Bin, ZHOU Yonghong
doaj   +1 more source

Managing Access to Biobanks:How Can We Reconcile Privacy and Public Interests in Genetic Research? [PDF]

open access: yes, 2010
This article is concerned with the ultimate objectives of genetic biobanks set up to promote the public interest—being the sharing of samples and data for medical research—and the consequences for personal privacy of realising them.
Frenkel, D. A.   +7 more
core   +1 more source

Privacy in context-based and epidemic forwarding

open access: yes2009 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks & Workshops, 2009
Autonomic and opportunistic communications require specific routing algorithms, like replication-based algorithms or context-based forwarding. Privacy is a major concern for protocols which disseminate the context of their destination. In this paper, we focus on the privacy issue inherent to context-based protocols, in the framework of an original ...
Abdullatif Shikfa   +2 more
openaire   +4 more sources

Telerehabilitation Store and Forward Applications: A Review of Applications and Privacy Considerations in Physical and Occupational Therapy Practice

open access: yesInternational Journal of Telerehabilitation, 2015
An overview of store and forward applications commonly used in physical and occupational therapy practice is reviewed with respect to regulation, privacy, security, and clinical applications. A privacy and security checklist provides a clear reference of
Christopher Peterson, Valerie Watzlaf
doaj   +1 more source

Metaverse: Security and Privacy Concerns

open access: yesJournal of Metaverse, 2023
The term “metaverse”, a three-dimensional virtual universe similar to the real realm, has always been full of imagination since it was put forward in the 1990s.
Zhongyun Hua   +4 more
doaj   +1 more source

Data Confidentiality in Mobile Ad hoc Networks [PDF]

open access: yes, 2012
Mobile ad hoc networks (MANETs) are self-configuring infrastructure-less networks comprised of mobile nodes that communicate over wireless links without any central control on a peer-to-peer basis.
Al-Bayatti, Ali   +3 more
core   +2 more sources

The right expert at the right time and place: From expertise identification to expertise selection [PDF]

open access: yes, 2008
We propose a unified and complete solution for expert finding in organizations, including not only expertise identification, but also expertise selection functionality.
Apers, Peter   +7 more
core   +3 more sources

Forward and Backward Private Searchable Encryption from Constrained Cryptographic Primitives [PDF]

open access: yes, 2017
Using dynamic Searchable Symmetric Encryption, a user with limited storage resources can securely outsource a database to an untrusted server, in such a way that the database can still be searched and updated efficiently.
Bost, Raphael   +2 more
core   +2 more sources

Home - About - Disclaimer - Privacy