Search

Your search keyword '"privacy"' showing total 515 results

Search Constraints

Start Over You searched for: Descriptor "privacy" Remove constraint Descriptor: "privacy" Journal ieee access Remove constraint Journal: ieee access
515 results on '"privacy"'

Search Results

1. On Secure and Energy-Efficient Message Communication Protocols for Internet of Vehicles: Cryptanalysis and Improvements

2. Securing X-Ray Images Into Cover Images Using Hybrid EBS Steganography With Five-Layer Cryptography

3. A Systematic Survey on TPE Schemes for the Cloud: Classification, Challenges, and Future Scopes

4. LSP–eHS: A Lightweight and Secure Protocol for e-Healthcare System

5. Enhancing Safety and Privacy in Industry 4.0: The ICE Laboratory Case Study

6. Security and Privacy in E-Health Systems: A Review of AI and Machine Learning Techniques

7. Exploring Social Media Privacy Concerns: A Comprehensive Survey Study Across 16 Middle Eastern and North African Countries

8. DBD-Guardian and Privacy-Aware Near Real-Time Cybersecurity Analytics

9. The Requirements, Benefits, and Barriers of IoT Solutions to Support Well-Being in Elementary Schools

10. A Threshold-Blind Signature Scheme and Its Application in Blockchain-Based Systems

11. TrajectGuard: A Comprehensive Privacy-Risk Framework for Multiple-Aspects Trajectories

12. AI-Powered Integrated With Encoding Mechanism Enhancing Privacy, Security, and Performance for IoT Ecosystem

13. RSHealth: A Ring Signature Scheme for Identity Anonymization and Transaction Privacy in Blockchain Based E-Healthcare Systems

14. Enhancing Privacy and Integrity in Computing Services Provisioning Using Blockchain and Zk-SNARKs

15. Proof of Trust and Expertise (PoTE): A Novel Consensus Mechanism for Enhanced Security and Scalability in Electronic Health Record Management

16. Blockchain for Food Industry: Opportunities, Requirements, Case Studies, and Research Challenges

17. NextGen Authentication: A Secure Blockchain-Based Protocol for Content-Centric Networks With Soulbound Tokens

18. Design a Software Reference Architecture to Enhance Privacy and Security in Electronic Health Records

19. Toward an Open Trust Establishment Infrastructure for Future Network: Motivations, Models, and Technologies

20. Privacy-Preserving Link Scheduling for Wireless Networks

21. Secure Sharing Architecture of Personal Healthcare Data Using Private Permissioned Blockchain for Telemedicine

22. Double Cloak Area Approach for Preserving Privacy and Reliability of Crowdsourcing Data

23. A Blockchain-Based Hybrid Architecture for Auditable Consent Management

24. D-BlockAuth: An Authentication Scheme-Based Dual Blockchain for 5G-Assisted Vehicular Fog Computing

25. Privacy Mechanisms and Evaluation Metrics for Synthetic Data Generation: A Systematic Review

26. Design of an Anomaly Detection Framework for Delay and Privacy-Aware Blockchain-Based Cloud Deployments

27. SUTMS: Designing a Unified Threat Management System for Home Networks

28. The Missing Link in Network Intrusion Detection: Taking AI/ML Research Efforts to Users

29. Mutual and Batch Authentication With Conditional Privacy-Preserving Scheme for V2G Communication System

30. A Study on Markov-Based Password Strength Meters

31. Innovative Homomorphic Sorting of Environmental Data in Area Monitoring Wireless Sensor Networks

32. Preserving Data Utility in Differentially Private Smart Home Data

33. A Survey on Security, Privacy, Trust, and Architectural Challenges in IoT Systems

34. Comprehensive Review and Analysis of Cryptography Techniques in Cloud Computing

35. PSLAPS-IoD: A Provable Secure and Lightweight Authentication Protocol for Securing Internet-of-Drones (IoD) Environment

36. Anonymization and Pseudonymization of FHIR Resources for Secondary Use of Healthcare Data

37. Deep Learning-Assisted Security and Privacy Provisioning in the Internet of Medical Things Systems: A Survey on Recent Advances

38. Maintaining Privacy in Face Recognition Using Federated Learning Method

39. Navigating the Maze: Exploring Blockchain Privacy and Its Information Retrieval

40. Enhancing Security of Host-Based Intrusion Detection Systems for the Internet of Things

41. Ethical Framework for Harnessing the Power of AI in Healthcare and Beyond

42. Exploring the Potential of Blockchain Technology in an IoT-Enabled Environment: A Review

43. You Are What You Buy: Personal Information Extraction From Anonymized Data

44. Blockchain-Based Privacy-Preserving Shop Floor Auditing Architecture

45. Securing the Internet of Things in Artificial Intelligence Era: A Comprehensive Survey

46. Enhancing Intrusion Detection Through Federated Learning With Enhanced Ghost_BiNet and Homomorphic Encryption

47. On the Evaluation of Privacy Impact Assessment and Privacy Risk Assessment Methodologies: A Systematic Literature Review

48. Obfuscated Privacy Malware Classifiers Based on Memory Dumping Analysis

49. Multi-Trigger-Key: Toward Multi-Task Privacy Preserving in Deep Learning

50. Balancing Privacy and Accuracy: Exploring the Impact of Data Anonymization on Deep Learning Models in Computer Vision

Catalog

Books, media, physical & digital resources