Results 31 to 40 of about 64,505 (309)

A Balance Privacy-Preserving Data Aggregation Model in Wireless Sensor Networks

open access: yesInternational Journal of Distributed Sensor Networks, 2015
Wireless sensor networks are always deployed in remote and hostile environments to gather sensitive information, in which sensor nodes are apt to encounter some serious leakage of sensitive data.
Changlun Zhang, Chao Li, Yi Zhao
doaj   +1 more source

Accountable Privacy-Preserving Mechanism for Cloud Computing Based on Identity-Based Encryption

open access: yesIEEE Access, 2018
Considering the openness and cross-domains of cloud computing, the traditional privacy-preserving technology cannot be applied in cloud computing efficiently.
Hongbing Cheng   +3 more
doaj   +1 more source

Deconvoluting kernel density estimation and regression for locally differentially private data

open access: yesScientific Reports, 2020
Local differential privacy has become the gold-standard of privacy literature for gathering or releasing sensitive individual data points in a privacy-preserving manner.
Farhad Farokhi
doaj   +1 more source

Crucial parameters for precise copy number variation detection in formalin‐fixed paraffin‐embedded solid cancer samples

open access: yesMolecular Oncology, EarlyView.
This study shows that copy number variations (CNVs) can be reliably detected in formalin‐fixed paraffin‐embedded (FFPE) solid cancer samples using ultra‐low‐pass whole‐genome sequencing, provided that key (pre)‐analytical parameters are optimized.
Hanne Goris   +10 more
wiley   +1 more source

Discovery and Targeted Proteomic Studies Reveal Striatal Markers Validated for Huntington's Disease

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective Clinical trials for Huntington's disease (HD) enrolling persons before clinical motor diagnosis (CMD) lack validated biomarkers. This study aimed to conduct an unbiased discovery analysis and a targeted examination of proteomic biomarkers scrutinized by clinical validation. Methods Cerebrospinal fluid was obtained from PREDICT‐HD and
Daniel Chelsky   +8 more
wiley   +1 more source

An Efficient Privacy-Preserving Mutual Authentication Scheme for Secure V2V Communication in Vehicular Ad Hoc Network

open access: yesIEEE Access, 2019
Recent years have witnessed that the new mobility Intelligent Transportation System is booming, especially the development of Vehicular Ad Hoc Networks (VANETs). It brings convenience and a good experience for drivers. Unfortunately, VANETs are suffering
Libing Wu   +7 more
doaj   +1 more source

Secure Outsourcing Algorithm of BTC Feature Extraction in Cloud Computing

open access: yesIEEE Access, 2020
Advances in cloud computing have aroused many researchers' interest in privacy-preserving feature extraction over outsourced multimedia data, especially private image data. Since block truncation coding (BTC) is known as a simple and efficient technology
Mingfang Jiang, Hengfu Yang
doaj   +1 more source

Predicting Epileptogenic Tubers in Patients With Tuberous Sclerosis Complex Using a Fusion Model Integrating Lesion Network Mapping and Machine Learning

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective Accurate localization of epileptogenic tubers (ETs) in patients with tuberous sclerosis complex (TSC) is essential but challenging, as these tubers lack distinct pathological or genetic markers to differentiate them from other cortical tubers.
Tinghong Liu   +11 more
wiley   +1 more source

Privacy-preserving email forensics

open access: yesDigital Investigation, 2015
AbstractIn many digital forensic investigations, email data needs to be analyzed. However, this poses a threat to the privacy of the individual whose emails are being examined and in particular becomes a problem if the investigation clashes with privacy laws.
Armknecht, Frederik, Dewald, Andreas
openaire   +2 more sources

Privacy-Preserving Technologies [PDF]

open access: yes, 2020
AbstractThis chapter introduces privacy and data protection by design, and reviews privacy-enhancing techniques (PETs). Although privacy by design includes both technical and operational measures, the chapter focuses on the technical measures. First, it enumerates design strategies.
Josep Domingo-Ferrer   +1 more
openaire   +1 more source

Home - About - Disclaimer - Privacy