Results 1 to 10 of about 195,399 (280)
Humanization of care patients in hemodialysis programm [PDF]
Introduction: The design on the privacy in hemodialysis stresses that the person is a being in the world that has various dimensions, interacts with the environment and experiences unique experiences that mark their individuality. Objective: To identify
Martins, Manuela +5 more
core +2 more sources
Between the changing Industry 4.0 landscape and the rise of Industry 5.0, where human intelligence and intelligent machines work together, vast amounts of privacy-sensitive data are generated, processed, and exchanged, making them attractive targets of ...
Adib Habbal +4 more
doaj +1 more source
Privacy preservation in permissionless blockchain: A survey
Permissionless blockchain, as a kind of distributed ledger, has gained considerable attention because of its openness, transparency, decentralization, and immutability.
Li Peng +5 more
doaj +1 more source
iPDA: An Integrity-Protecting Private Data Aggregation Scheme for Wireless Sensor Networks [PDF]
Data aggregation is an efficient mechanism widely used in wireless sensor networks (WSN) to collect statistics about data of interests. However, the shared-medium nature of communication makes the WSNs are vulnerable to eavesdropping and packet tampering/
Abdelzaher, Tarek F. +4 more
core
Survey on data preserving for the search of internet of things
With the rapid development of the internet of things(IoT) technology and big data technology,the search engine for internet of things become a hot research topic.However,because of the openness of the search of IoT,the privacy in traditional internet ...
Jia-hui WANG +2 more
doaj +2 more sources
GAIN RATIO BASED FEATURE SELECTION METHOD FOR PRIVACY PRESERVATION [PDF]
Privacy-preservation is a step in data mining that tries to safeguard sensitive information from unsanctioned disclosure and hence protecting individual data records and their privacy. There are various privacy preservation techniques like k-anonymity, l-
R. Praveena Priyadarsini +2 more
doaj
Economic location-based services, privacy and the relationship to identity [PDF]
Mobile telephony and mobile internet are driving a new application paradigm: location-based services (LBS). Based on a person’s location and context, personalized applications can be deployed.
Fritsch, Lothar
core
AdaptiveMutate: a technique for privacy preservation
Mobile apps are known to be rich sources for gathering privacy-sensitive information about smartphone users. Despite the presence of encryption, passive network adversaries who have access to the network infrastructure can eavesdrop on the traffic and ...
Louma Chaddad +3 more
doaj +1 more source
A Novel Pseudonym Changing Scheme for Location Privacy Preservation in Sparse Traffic Areas
A large number of schemes have been proposed to deal with location privacy preservation in Vehicular Ad Hoc Networks (VANETs). One of the most popular ways to preserve location privacy is pseudonym changing, which includes mix-zone, silent zone, mix ...
Ahsan Hayat +5 more
doaj +1 more source
A Multi-Input Fusion Model for Privacy and Semantic Preservation in Facial Image Datasets
The widespread application of multimedia technologies such as video surveillance, online meetings, and drones facilitates the acquisition of a large amount of data that may contain facial features, posing significant concerns with regard to privacy ...
Yuanzhe Yang +5 more
doaj +1 more source

