Results 111 to 120 of about 2,213,706 (287)

Analyzing users’ behaviour to identify their privacy concerns [PDF]

open access: yes, 2010
The majority of studies examining privacy concerns of Internet users are based on surveys. Many problems have, however, been identified with using surveys to measure people’s privacy concerns.
Cunningham, Sally Jo, Masoodian, Masood
core  

Security Policies Approached by Value Analysis Concepts [PDF]

open access: yes
This paper intends to redefine the role of the end users of the Internet facilities, in the process of creation of more secure transactions on the Internet, in respect of their privacy.
Florin Buhociu   +2 more
core  

On the Relationship Between Inference and Data Privacy in Decentralized IoT Networks [PDF]

open access: yesarXiv, 2018
In a decentralized Internet of Things (IoT) network, a fusion center receives information from multiple sensors to infer a public hypothesis of interest. To prevent the fusion center from abusing the sensor information, each sensor sanitizes its local observation using a local privacy mapping, which is designed to achieve both inference privacy of a ...
arxiv  

Privacy in the Internet of Things [PDF]

open access: yesWireless Communications and Mobile Computing, 2018
Zhipeng Cai   +4 more
openaire   +3 more sources

Preventing Privacy Attacks and Cybercrime in the Mobile Internet [PDF]

open access: bronze, 2002
Simone Fischer-Huebner   +2 more
openalex   +1 more source

HAFedL: A Hessian-Aware Adaptive Privacy Preserving Horizontal Federated Learning Scheme for IoT Applications

open access: yesIEEE Access
Federated Learning (FL) is a paradigm in distributed machine learning, which has gained significant attention in the recent years especially in the domain of Internet of Things.
Sumitra, Jaya Sharma, Meetha V. Shenoy
doaj   +1 more source

Noise-added selection method for location-based service using differential privacy in Internet of Things

open access: yesAdvances in Mechanical Engineering, 2019
With the development of Internet of Things, many applications need to use people’s location information, resulting in a large amount of data need to be processed, called big data.
Zhimin Li, Haoze Lv, Zhaobin Liu
doaj   +1 more source

Home - About - Disclaimer - Privacy