Results 1 to 10 of about 121,345 (302)

Evaluation of privacy protection methods of public service advertising visual design in the perspective of artificial intelligence internet of things. [PDF]

open access: goldPLoS ONE
With the widespread application of monitoring technology and network storage technology, there are some privacy issues in the process of public service advertising visual design and the process of pushing public service advertising visual design works ...
Xujun Tang
doaj   +3 more sources

Construction of evolutionary stability and signal game model for privacy protection in the internet of things [PDF]

open access: yesScientific Reports
The research focuses on privacy protection in the Internet of Things environment. A model based on evolutionary theory game and signal game mechanism is proposed to analyze and optimize privacy protection strategies.
Yu Li, Huamin Liu, Lei Lu
doaj   +2 more sources

The Practice and Enlightenment on Privacy Protection Service of Cornell University Library [PDF]

open access: yesNongye tushu qingbao xuebao, 2021
[Purpose/Significance] User privacy protection is an important core value issue. This paper analyzes the privacy protection services of Cornell University Library in order to provide reference for domestic libraries. [Method/Process] This paper clarifies
YU Defeng
doaj   +1 more source

Research on Blockchain Privacy Protection Mechanism [PDF]

open access: yesJisuanji gongcheng, 2023
As a type of distributed ledger maintained by multiple nodes, blockchain integrates a P2P network, consensus algorithm, smart contract, and cryptography technology to build an efficient and low-cost decentralized trust mechanism in an open network ...
WANG Qun, LI Fujuan, NI Xueli, XIA Lingling, LIANG Guangjun
doaj   +1 more source

Privacy concerns and protection behavior during the Covid-19 pandemic [PDF]

open access: yesProblems and Perspectives in Management, 2022
This paper aims to analyze the protection behavior of employees while working remotely during the Covid-19 pandemic using online video chat software.
Ranjany Sundaram, Snehal Shetty
doaj   +1 more source

Rule Fusion of Privacy Protection Strategies for Co-Ownership Data Sharing

open access: yesMathematics, 2022
With the rapid development of social networks, personal privacy leakage has become more and more serious. A social network is a shared platform. Resources in a social network may be shared by multiple owners.
Tinghuai Ma   +4 more
doaj   +1 more source

Research on the influence mechanism of privacy invasion experiences with privacy protection intentions in social media contexts: Regulatory focus as the moderator

open access: yesFrontiers in Psychology, 2023
IntroductionIn recent years, there have been numerous online privacy violation incidents caused by the leakage of personal information of social media users, yet there seems to be a tendency for users to burn out when it comes to privacy protection ...
Subai Chen   +3 more
doaj   +1 more source

Survey on blockchain privacy protection techniques in cryptography

open access: yes网络与信息安全学报, 2022
In recent years, the issue of data privacy has attracted increased attention, and how to achieve effective privacy protection in blockchain is a new research hotspot.In view of the current research status and development trend of blockchain in privacy ...
Feng LIU, Jie YANG, Jiayin QI
doaj   +3 more sources

DPLQ: Location‐based service privacy protection scheme based on differential privacy

open access: yesIET Information Security, 2021
The existing privacy protection schemes for Location‐Based Service (LBS) only protect users' location privacy or query privacy, which can not adopt both of the privacy protections simultaneously in the LBS system. Moreover, these schemes cannot take into
Qingyun Zhang   +3 more
doaj   +1 more source

Privacy Protection Model and Parameter Optimization Method for Data Dissemination [PDF]

open access: yesJisuanji gongcheng, 2021
In order to improve the privacy protection for data to be published,this paper proposes a privacy protection model integrating k-anonymity,l-diversity and t-closure methods.The model can assist in the selection of the most suitable privacy protection ...
XU Yabin, GUO Hao
doaj   +1 more source

Home - About - Disclaimer - Privacy