Results 21 to 30 of about 676,463 (285)
Localizing the Politics of Privacy in Communication and Media Research
While previous communication and media research has largely focused on either studying privacy as personal boundary management or made efforts to investigate the structural (legal or economic) condition of privacy, we observe an emergent body of research
Johanna E. Möller, Leyla Dogruel
doaj +1 more source
Key Agreement Between User and Drone With Forward
Many applications are equipped to utilize drones to provide various services to users in Internet of Drones (IoD) environments. In such applications, it is necessary to make a session key between a drone and a user to establish an authenticated and ...
Jae Yeol Jeong +2 more
doaj +1 more source
Investigation into and Reflection of User Privacy Policies of Reading Apps [PDF]
[Purpose/Significance] As reading apps are becoming popular for they are convenient for people to read, people are also increasingly concerned about user privacy issues.
ZHANG Bin, ZHOU Yonghong
doaj +1 more source
Managing Access to Biobanks:How Can We Reconcile Privacy and Public Interests in Genetic Research? [PDF]
This article is concerned with the ultimate objectives of genetic biobanks set up to promote the public interest—being the sharing of samples and data for medical research—and the consequences for personal privacy of realising them.
Frenkel, D. A. +7 more
core +1 more source
Privacy in context-based and epidemic forwarding
Autonomic and opportunistic communications require specific routing algorithms, like replication-based algorithms or context-based forwarding. Privacy is a major concern for protocols which disseminate the context of their destination. In this paper, we focus on the privacy issue inherent to context-based protocols, in the framework of an original ...
Abdullatif Shikfa +2 more
openaire +4 more sources
An overview of store and forward applications commonly used in physical and occupational therapy practice is reviewed with respect to regulation, privacy, security, and clinical applications. A privacy and security checklist provides a clear reference of
Christopher Peterson, Valerie Watzlaf
doaj +1 more source
Metaverse: Security and Privacy Concerns
The term “metaverse”, a three-dimensional virtual universe similar to the real realm, has always been full of imagination since it was put forward in the 1990s.
Zhongyun Hua +4 more
doaj +1 more source
Data Confidentiality in Mobile Ad hoc Networks [PDF]
Mobile ad hoc networks (MANETs) are self-configuring infrastructure-less networks comprised of mobile nodes that communicate over wireless links without any central control on a peer-to-peer basis.
Al-Bayatti, Ali +3 more
core +2 more sources
The right expert at the right time and place: From expertise identification to expertise selection [PDF]
We propose a unified and complete solution for expert finding in organizations, including not only expertise identification, but also expertise selection functionality.
Apers, Peter +7 more
core +3 more sources
Forward and Backward Private Searchable Encryption from Constrained Cryptographic Primitives [PDF]
Using dynamic Searchable Symmetric Encryption, a user with limited storage resources can securely outsource a database to an untrusted server, in such a way that the database can still be searched and updated efficiently.
Bost, Raphael +2 more
core +2 more sources

