Results 61 to 70 of about 2,375,414 (378)
Aiming at the problems for existing data transmission mechanisms in Internet of vehicles, such as real-time performance, high efficiency of computing tasks, vehicle data privacy, etc., this paper proposes an efficient and secure data transmission ...
Wenjuan Zhang, Gang Li
doaj +1 more source
Internet of Vehicles (IoVs) presents promising opportunities for vehicle to everything (V2X) applications, wherein authentication acts as the cornerstone to realize trustworthy vehicular context and to support advanced applications.
Haoye Chai +4 more
semanticscholar +1 more source
Impact of Positive Lifestyle Behaviors on Direct Health Care Cost Savings for Low Back Pain
Objective This study aimed to investigate the relationship between a previously purpose‐developed lifestyle behavior scale and health care cost savings related to low back pain (LBP). Methods This longitudinal study used data from the Australian Twin Back (AUTBACK) study. LBP and lifestyle behavior measures were collected at baseline. Physical activity
Ye Tian +8 more
wiley +1 more source
Data privacy preservation for the search of Internet of things based on fine-grained authorization
With the rapid development of the Internet of things (IoT) technology and cloud computing technology, the search engine for Internet of things become a hot research topic.
Jia-hui WANG, Chuan-yi LIU,Bin-xing FANG
doaj +3 more sources
In Things We Trust? Towards trustability in the Internet of Things
This essay discusses the main privacy, security and trustability issues with the Internet of ...
A. Bandura +9 more
core +1 more source
Blogging: self presentation and privacy [PDF]
Blogs are permeating most niches of social life, and addressing a wide range of topics from scholarly and political issues1 to family and children’s daily lives. By their very nature, blogs raise a number of privacy issues as they are easy to produce and
Karen Mccullagh A, Technology Law
core +2 more sources
Objective This study assessed sarilumab in treating patients with polyarticular‐course juvenile idiopathic arthritis (pcJIA). Methods This phase 2b, open‐label study (NCT02776735) consisted of three sequential parts (each with a core‐treatment and extension‐phase). During part 1, three doses were assessed in two weight groups (Group A/B: ≥30–60 kg/≥10–<
Fabrizio De Benedetti +19 more
wiley +1 more source
Little attention has been given to how members of economically, socially, and digitally disadvantaged groups experience privacy. Using a door-to-door paper-and-pencil household census of public housing communities in a major American city, this study ...
Xiaoqian Li +2 more
doaj +2 more sources
In this paper, monitoring is perceived as a way to observe how people change their attitude towards privacy, particularly in the Internet circumstances. The paper aims to analyze privacy awareness and the privacy paradox.
Małgorzata Pańkowska
doaj +1 more source
Leveraging Secure Multiparty Computation in the Internet of Things
Centralized systems in the Internet of Things---be it local middleware or cloud-based services---fail to fundamentally address privacy of the collected data.
Carle, Georg, von Maltitz, Marcel
core +1 more source

