Results 1 to 10 of about 43,942 (146)

Proxy-Terms Based Query Obfuscation Technique for Private Web Search [PDF]

open access: yesIEEE Access, 2022
Search engines store users’ queries in a query log for performing personalized information retrieval. However, query logs cause privacy concerns and reveal a lot of information about individuals if used against them.
Shariq Bashir   +2 more
doaj   +4 more sources

Multi-Group ObScure Logging (MG-OSLo) A Privacy-Preserving Protocol for Private Web Search [PDF]

open access: yesIEEE Access, 2021
The Web Search Engine (WSE) is a software system used to retrieve data from the web successfully. WSE uses the user’s search queries to build the user’s profile and provide personalized results.
Mohib Ullah   +6 more
doaj   +2 more sources

Private Web Search Using Proxy-Query Based Query Obfuscation Scheme

open access: yesIEEE Access, 2023
People use web search engines to retrieve information from the world wide web. Search engines maintain query logs to refine retrieved information for personalized web search.
Shariq Bashir, Akmal Saeed Khattak
doaj   +2 more sources

Online resources for information on shoulder arthroplasty: an assessment of quality and readability [PDF]

open access: yesClinics in Shoulder and Elbow, 2023
Background Many patients use online resources to educate themselves on surgical procedures and make well-informed healthcare decisions. The aim of our study was to evaluate the quality and readability of online resources exploring shoulder arthroplasty ...
Mohamad Y. Fares   +5 more
doaj   +1 more source

Browsers’ Private Mode: Is It What We Were Promised?

open access: yesComputers, 2021
Web browsers are one of the most used applications on every computational device in our days. Hence, they play a pivotal role in any forensic investigation and help determine if nefarious or suspicious activity has occurred on that device.
Kris Hughes   +5 more
doaj   +1 more source

X-search [PDF]

open access: yesProceedings of the 18th ACM/IFIP/USENIX Middleware Conference, 2017
Proceedings of the 18th ACM/IFIP/USENIX Middleware Conference.
Ben Mokhtar, Sonia   +5 more
openaire   +3 more sources

NN-QuPiD Attack: Neural Network-Based Privacy Quantification Model for Private Information Retrieval Protocols

open access: yesComplexity, 2021
Web search engines usually keep users’ profiles for multiple purposes, such as result ranking and relevancy, market research, and targeted advertisements. However, user web search history may contain sensitive and private information about the user, such
Rafiullah Khan   +4 more
doaj   +1 more source

Commodification beyond data: regulating the separation of information from noise

open access: yesEuropean Law Open, 2023
Digital technology brought informational saturation to our lives. In cyberspace, private and business users need help to make valuable pieces of information stand out from the noise of excessive information.
Linus J. Hoffmann
doaj   +1 more source

Analysis of domestic language tourism in Spain [PDF]

open access: yesStudia Periegetica, 2021
The general objective of this study was to research the revitalisation of language tourism (LT) activities in Spain. More specifically, the study aimed at describing the LT phenomenon, analysing the global and Spanish LT market, and examining domestic LT
Laia Tonda, Montserrat Iglesias
doaj   +1 more source

Public-private Partnership Experiences and Achievements in Providing Primary Health Care to the Elderly: A Scoping Review

open access: yesHealth Technology Assessment in Action, 2022
Introduction: Given the expansion of public-private partnership (PPP) policy in the provision of primary health care to the elderly in different countries, this study aimed to investigate the experiences and achievements of PPP in this field using a ...
Saber Azami Aghdash   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy