Results 61 to 70 of about 2,375,414 (378)

An Efficient and Secure Data Transmission Mechanism for Internet of Vehicles Considering Privacy Protection in Fog Computing Environment

open access: yesIEEE Access, 2020
Aiming at the problems for existing data transmission mechanisms in Internet of vehicles, such as real-time performance, high efficiency of computing tasks, vehicle data privacy, etc., this paper proposes an efficient and secure data transmission ...
Wenjuan Zhang, Gang Li
doaj   +1 more source

CyberChain: Cybertwin Empowered Blockchain for Lightweight and Privacy-preserving Authentication in Internet of Vehicles

open access: yesIEEE Transactions on Vehicular Technology, 2021
Internet of Vehicles (IoVs) presents promising opportunities for vehicle to everything (V2X) applications, wherein authentication acts as the cornerstone to realize trustworthy vehicular context and to support advanced applications.
Haoye Chai   +4 more
semanticscholar   +1 more source

Impact of Positive Lifestyle Behaviors on Direct Health Care Cost Savings for Low Back Pain

open access: yesArthritis Care &Research, EarlyView.
Objective This study aimed to investigate the relationship between a previously purpose‐developed lifestyle behavior scale and health care cost savings related to low back pain (LBP). Methods This longitudinal study used data from the Australian Twin Back (AUTBACK) study. LBP and lifestyle behavior measures were collected at baseline. Physical activity
Ye Tian   +8 more
wiley   +1 more source

Data privacy preservation for the search of Internet of things based on fine-grained authorization

open access: yes网络与信息安全学报, 2017
With the rapid development of the Internet of things (IoT) technology and cloud computing technology, the search engine for Internet of things become a hot research topic.
Jia-hui WANG, Chuan-yi LIU,Bin-xing FANG
doaj   +3 more sources

In Things We Trust? Towards trustability in the Internet of Things

open access: yes, 2011
This essay discusses the main privacy, security and trustability issues with the Internet of ...
A. Bandura   +9 more
core   +1 more source

Blogging: self presentation and privacy [PDF]

open access: yes, 2008
Blogs are permeating most niches of social life, and addressing a wide range of topics from scholarly and political issues1 to family and children’s daily lives. By their very nature, blogs raise a number of privacy issues as they are easy to produce and
Karen Mccullagh A, Technology Law
core   +2 more sources

Sarilumab in Polyarticular‐Course Juvenile Idiopathic Arthritis: Dose‐Finding and One‐Year Analysis of a Phase 2b, Open‐Label, Multicenter Study

open access: yesArthritis Care &Research, Accepted Article.
Objective This study assessed sarilumab in treating patients with polyarticular‐course juvenile idiopathic arthritis (pcJIA). Methods This phase 2b, open‐label study (NCT02776735) consisted of three sequential parts (each with a core‐treatment and extension‐phase). During part 1, three doses were assessed in two weight groups (Group A/B: ≥30–60 kg/≥10–<
Fabrizio De Benedetti   +19 more
wiley   +1 more source

Privacy at the Margins| Concerns, Skills, and Activities: Multilayered Privacy Issues in Disadvantaged Urban Communities

open access: yesInternational Journal of Communication, 2018
Little attention has been given to how members of economically, socially, and digitally disadvantaged groups experience privacy. Using a door-to-door paper-and-pencil household census of public housing communities in a major American city, this study ...
Xiaoqian Li   +2 more
doaj   +2 more sources

Privacy Awareness Monitoring

open access: yesProblemy Zarządzania, 2019
In this paper, monitoring is perceived as a way to observe how people change their attitude towards privacy, particularly in the Internet circumstances. The paper aims to analyze privacy awareness and the privacy paradox.
Małgorzata Pańkowska
doaj   +1 more source

Leveraging Secure Multiparty Computation in the Internet of Things

open access: yes, 2018
Centralized systems in the Internet of Things---be it local middleware or cloud-based services---fail to fundamentally address privacy of the collected data.
Carle, Georg, von Maltitz, Marcel
core   +1 more source

Home - About - Disclaimer - Privacy