Results 11 to 20 of about 200,943 (331)
Privacy-Preserving Schemes for Safeguarding Heterogeneous Data Sources in Cyber-Physical Systems
Cyber-Physical Systems (CPS) underpin global critical infrastructure, including power, water, gas systems and smart grids. CPS, as a technology platform, is unique as a target for Advanced Persistent Threats (APTs), given the potentially high impact of a
Marwa Keshk +4 more
doaj +1 more source
Blockchain and smart contracts have seen significant application over the last decade, revolutionising many industries, including cryptocurrency, finance and banking, and supply chain management.
Quang Nhat Tran +5 more
doaj +1 more source
Personalized privacy preservation [PDF]
We study generalization for preserving privacy in publication of sensitive data. The existing methods focus on a universal approach that exerts the same amount of preservation for all persons, with-out catering for their concrete needs. The consequence is that we may be offering insufficient protection to a subset of people, while applying excessive ...
Xiaokui Xiao, Yufei Tao 0001
openaire +1 more source
The Privacy ZEBRA: Zero Evidence Biometric Recognition Assessment [PDF]
Mounting privacy legislation calls for the preservation of privacy in speech technology, though solutions are gravely lacking. While evaluation campaigns are long-proven tools to drive progress, the need to consider a privacy adversary implies that ...
Bonastre, Jean-Francois +7 more
core +2 more sources
Parking recommender system privacy preservation through anonymization and differential privacy
Recent advancements in the Internet of Things (IoT) have enabled the development of smart parking systems that use services of third‐party parking recommender system to provide recommendations of personalized parking spot to users based on their past ...
Yasir Saleem +3 more
doaj +1 more source
AnonPri: A Secure Anonymous Private Authentication Protocol for RFID Systems [PDF]
Privacy preservation in RFID systems is a very important issue in modern day world. Privacy activists have been worried about the invasion of user privacy while using various RFID systems and services.
Ahamed, Sheikh Iqbal +2 more
core +3 more sources
Privacy-Preserving Reengineering of Model-View-Controller Application Architectures Using Linked Data [PDF]
When a legacy system’s software architecture cannot be redesigned, implementing additional privacy requirements is often complex, unreliable and costly to maintain.
Dodero Beardo, Juan Manuel +3 more
core +2 more sources
Achieving User-Defined Location Privacy Preservation Using a P2P System
As location-based services become widely used in daily life, there is growing concern in preserving location privacy of users to avoid that attackers infer information about users by collecting and analyzing requests initiated by users.
Shengchao Liu +3 more
doaj +1 more source
Personal data have been increasingly used in data-driven applications to improve quality of life. However, privacy preservation of personal data while sharing it with analysts/ researchers has become an essential requirement to be met by data owners ...
Abdul Majeed, Seong Oun Hwang
doaj +1 more source
Privacy-Preserving Passive DNS [PDF]
The Domain Name System (DNS) was created to resolve the IP addresses of web servers to easily remembered names. When it was initially created, security was not a major concern; nowadays, this lack of inherent security and trust has exposed the global DNS infrastructure to malicious actors.
Pavlos Papadopoulos +4 more
openaire +3 more sources

