Evaluation of privacy protection methods of public service advertising visual design in the perspective of artificial intelligence internet of things. [PDF]
With the widespread application of monitoring technology and network storage technology, there are some privacy issues in the process of public service advertising visual design and the process of pushing public service advertising visual design works ...
Xujun Tang
doaj +3 more sources
Construction of evolutionary stability and signal game model for privacy protection in the internet of things [PDF]
The research focuses on privacy protection in the Internet of Things environment. A model based on evolutionary theory game and signal game mechanism is proposed to analyze and optimize privacy protection strategies.
Yu Li, Huamin Liu, Lei Lu
doaj +2 more sources
The Practice and Enlightenment on Privacy Protection Service of Cornell University Library [PDF]
[Purpose/Significance] User privacy protection is an important core value issue. This paper analyzes the privacy protection services of Cornell University Library in order to provide reference for domestic libraries. [Method/Process] This paper clarifies
YU Defeng
doaj +1 more source
Research on Blockchain Privacy Protection Mechanism [PDF]
As a type of distributed ledger maintained by multiple nodes, blockchain integrates a P2P network, consensus algorithm, smart contract, and cryptography technology to build an efficient and low-cost decentralized trust mechanism in an open network ...
WANG Qun, LI Fujuan, NI Xueli, XIA Lingling, LIANG Guangjun
doaj +1 more source
Privacy concerns and protection behavior during the Covid-19 pandemic [PDF]
This paper aims to analyze the protection behavior of employees while working remotely during the Covid-19 pandemic using online video chat software.
Ranjany Sundaram, Snehal Shetty
doaj +1 more source
Rule Fusion of Privacy Protection Strategies for Co-Ownership Data Sharing
With the rapid development of social networks, personal privacy leakage has become more and more serious. A social network is a shared platform. Resources in a social network may be shared by multiple owners.
Tinghuai Ma +4 more
doaj +1 more source
IntroductionIn recent years, there have been numerous online privacy violation incidents caused by the leakage of personal information of social media users, yet there seems to be a tendency for users to burn out when it comes to privacy protection ...
Subai Chen +3 more
doaj +1 more source
Survey on blockchain privacy protection techniques in cryptography
In recent years, the issue of data privacy has attracted increased attention, and how to achieve effective privacy protection in blockchain is a new research hotspot.In view of the current research status and development trend of blockchain in privacy ...
Feng LIU, Jie YANG, Jiayin QI
doaj +3 more sources
DPLQ: Location‐based service privacy protection scheme based on differential privacy
The existing privacy protection schemes for Location‐Based Service (LBS) only protect users' location privacy or query privacy, which can not adopt both of the privacy protections simultaneously in the LBS system. Moreover, these schemes cannot take into
Qingyun Zhang +3 more
doaj +1 more source
Privacy Protection Model and Parameter Optimization Method for Data Dissemination [PDF]
In order to improve the privacy protection for data to be published,this paper proposes a privacy protection model integrating k-anonymity,l-diversity and t-closure methods.The model can assist in the selection of the most suitable privacy protection ...
XU Yabin, GUO Hao
doaj +1 more source

