Results 1 to 10 of about 195,399 (280)

Humanization of care patients in hemodialysis programm [PDF]

open access: yes, 2017
Introduction: The design on the privacy in hemodialysis stresses that the person is a being in the world that has various dimensions, interacts with the environment and experiences unique experiences that mark their individuality. Objective: To identify
Martins, Manuela   +5 more
core   +2 more sources

Privacy as a Lifestyle: Empowering assistive technologies for people with disabilities, challenges and future directions

open access: yesJournal of King Saud University: Computer and Information Sciences
Between the changing Industry 4.0 landscape and the rise of Industry 5.0, where human intelligence and intelligent machines work together, vast amounts of privacy-sensitive data are generated, processed, and exchanged, making them attractive targets of ...
Adib Habbal   +4 more
doaj   +1 more source

Privacy preservation in permissionless blockchain: A survey

open access: yesDigital Communications and Networks, 2021
Permissionless blockchain, as a kind of distributed ledger, has gained considerable attention because of its openness, transparency, decentralization, and immutability.
Li Peng   +5 more
doaj   +1 more source

iPDA: An Integrity-Protecting Private Data Aggregation Scheme for Wireless Sensor Networks [PDF]

open access: yes, 2007
Data aggregation is an efficient mechanism widely used in wireless sensor networks (WSN) to collect statistics about data of interests. However, the shared-medium nature of communication makes the WSNs are vulnerable to eavesdropping and packet tampering/
Abdelzaher, Tarek F.   +4 more
core  

Survey on data preserving for the search of internet of things

open access: yesTongxin xuebao, 2016
With the rapid development of the internet of things(IoT) technology and big data technology,the search engine for internet of things become a hot research topic.However,because of the openness of the search of IoT,the privacy in traditional internet ...
Jia-hui WANG   +2 more
doaj   +2 more sources

GAIN RATIO BASED FEATURE SELECTION METHOD FOR PRIVACY PRESERVATION [PDF]

open access: yesICTACT Journal on Soft Computing, 2011
Privacy-preservation is a step in data mining that tries to safeguard sensitive information from unsanctioned disclosure and hence protecting individual data records and their privacy. There are various privacy preservation techniques like k-anonymity, l-
R. Praveena Priyadarsini   +2 more
doaj  

Economic location-based services, privacy and the relationship to identity [PDF]

open access: yes, 2005
Mobile telephony and mobile internet are driving a new application paradigm: location-based services (LBS). Based on a person’s location and context, personalized applications can be deployed.
Fritsch, Lothar
core  

AdaptiveMutate: a technique for privacy preservation

open access: yesDigital Communications and Networks, 2019
Mobile apps are known to be rich sources for gathering privacy-sensitive information about smartphone users. Despite the presence of encryption, passive network adversaries who have access to the network infrastructure can eavesdrop on the traffic and ...
Louma Chaddad   +3 more
doaj   +1 more source

A Novel Pseudonym Changing Scheme for Location Privacy Preservation in Sparse Traffic Areas

open access: yesIEEE Access, 2023
A large number of schemes have been proposed to deal with location privacy preservation in Vehicular Ad Hoc Networks (VANETs). One of the most popular ways to preserve location privacy is pseudonym changing, which includes mix-zone, silent zone, mix ...
Ahsan Hayat   +5 more
doaj   +1 more source

A Multi-Input Fusion Model for Privacy and Semantic Preservation in Facial Image Datasets

open access: yesApplied Sciences, 2023
The widespread application of multimedia technologies such as video surveillance, online meetings, and drones facilitates the acquisition of a large amount of data that may contain facial features, posing significant concerns with regard to privacy ...
Yuanzhe Yang   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy