Results 41 to 50 of about 200,943 (331)

RcDT: Privacy Preservation Based on R-Constrained Dummy Trajectory in Mobile Social Networks

open access: yesIEEE Access, 2019
The boom of mobile devices and location-based services (LBSs) greatly enriches the mobile social network (MSN) applications, which bring convenience to our daily life and, meanwhile, raise serious privacy concerns due to the potential disclosure risk of ...
Jinquan Zhang   +3 more
doaj   +1 more source

Rate-Privacy in Wireless Sensor Networks

open access: yes, 2013
This paper introduces the concept of rate privacy in the context of wireless sensor networks. Our discussion reveals that the concept indeed is of a great importance for the privacy preservation of such networks.
Derakhshi, H.   +3 more
core   +1 more source

Privacy-Preserving Loyalty Programs [PDF]

open access: yes, 2015
Presented at the 9th DPM International Workshop on Data Privacy Management (DPM 2014, held on Sep. 10, 2014).
Alberto Blanco-Justicia   +1 more
openaire   +2 more sources

Blinatumomab Utilization in Pediatric B‐Cell Acute Lymphoblastic Leukemia: Experience From the Mountain West

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background Blinatumomab is a bispecific T‐cell engager approved for the treatment of pediatric B‐cell acute lymphoblastic leukemia (B‐ALL). Outpatient home infusion reduces hospitalization burden and optimizes resource utilization, but is logistically challenging.
Angela Parra del Riego   +10 more
wiley   +1 more source

Privacy preservation in permissionless blockchain: A survey

open access: yesDigital Communications and Networks, 2021
Permissionless blockchain, as a kind of distributed ledger, has gained considerable attention because of its openness, transparency, decentralization, and immutability.
Li Peng   +5 more
doaj   +1 more source

iPDA: An Integrity-Protecting Private Data Aggregation Scheme for Wireless Sensor Networks [PDF]

open access: yes, 2007
Data aggregation is an efficient mechanism widely used in wireless sensor networks (WSN) to collect statistics about data of interests. However, the shared-medium nature of communication makes the WSNs are vulnerable to eavesdropping and packet tampering/
Abdelzaher, Tarek F.   +4 more
core  

Advanced Cloud Privacy Threat Modeling

open access: yes, 2016
Privacy-preservation for sensitive data has become a challenging issue in cloud computing. Threat modeling as a part of requirements engineering in secure software development provides a structured approach for identifying attacks and proposing ...
Gholami, Ali, Laure, Erwin
core   +1 more source

Prognostic Implications of Sleep Architecture for Patients Admitted to the Intensive Care Unit With Status Epilepticus

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective Status epilepticus (SE) is associated with significant mortality. Sleep architecture may reflect normal brain function. Impaired sleep architecture is associated with poorer outcomes in numerous conditions. Here we investigate the association of sleep architecture in continuous EEG (cEEG) with survival in SE.
Ran R. Liu   +5 more
wiley   +1 more source

Humanization of care patients in hemodialysis programm [PDF]

open access: yes, 2017
Introduction: The design on the privacy in hemodialysis stresses that the person is a being in the world that has various dimensions, interacts with the environment and experiences unique experiences that mark their individuality. Objective: To identify
Martins, Manuela   +5 more
core   +2 more sources

Clustering Algorithm Reveals Dopamine‐Motor Mismatch in Cognitively Preserved Parkinson's Disease

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective To explore the relationship between dopaminergic denervation and motor impairment in two de novo Parkinson's disease (PD) cohorts. Methods n = 249 PD patients from Parkinson's Progression Markers Initiative (PPMI) and n = 84 from an external clinical cohort.
Rachele Malito   +14 more
wiley   +1 more source

Home - About - Disclaimer - Privacy