We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 81-100 of 10,000 results
  1. Location Privacy Protection Algorithm Based on the Division Method of Voronoi in the Internet of Vehicles

    Position fuzzy algorithm has certain security, but it doesn’t fit well with the actual situation of the Internet of vehicles in road network. So, in...
    Peng-shou **e, Xue-ming Han, ... Guo-qiang Ma in Artificial Intelligence and Security
    Conference paper 2020
  2. Achieving Privacy Preservation Constraints in Missing-Value Datasets

    Privacy violation issues must be taken into consideration when datasets are released for public use. To address these issues, there are various...

    Surapon Riyana, Srikul Nanthachumphu, Noppamas Riyana in SN Computer Science
    Article 04 July 2020
  3. A systematic literature review on wearable health data publishing under differential privacy

    Wearable devices generate different types of physiological data about the individuals. These data can provide valuable insights for medical...

    Munshi Saifuzzaman, Tajkia Nuri Ananna, ... Farida Chowdhury in International Journal of Information Security
    Article 19 January 2022
  4. Tor network anonymity evaluation based on node anonymity

    In order to address the shortcomings of traditional anonymity network anonymity evaluation methods, which only analyze from the perspective of the...

    Jun Cui, Changqi Huang, ... Ran Wei in Cybersecurity
    Article Open access 08 November 2023
  5. Smart Anonymity: a mechanism for recommending data anonymization algorithms based on data profiles for IoT environments

    The internet of things (IoT) has seen rapid expansion, but this growth brings significant privacy challenges due to the large amounts of data...

    Flávio Neves, Rafael Souza, ... Vinicius Garcia in The Journal of Supercomputing
    Article 04 June 2024
  6. Application of Computer Simulation to the Anonymization of Personal Data: Synthesis-Based Anonymization Model and Algorithm

    Abstract

    This paper describes the second part of our study devoted to automated anonymization of personal data. The overview and analysis of research...

    A. V. Borisov, A. V. Bosov, A. V. Ivanov in Programming and Computer Software
    Article 09 October 2023
  7. Application of Computer Simulation to the Anonymization of Personal Data: State-of-the-Art and Key Points

    Abstract

    The first part of the study of the automated processing of personal data for the purpose of their anonymization and analysis is presented....

    A. V. Borisov, A. V. Bosov, A. V. Ivanov in Programming and Computer Software
    Article 28 July 2023
  8. An elliptic curve-based lightweight mutual authentication scheme for secure communication in smart grids

    The energy balance between consumers and the smart grid is preserved using data transferred from the smart grids' devices to either the utility...

    Fatty M. Salem, Reham Khairy, Ihab A. Ali in International Journal of Information Technology
    Article 06 April 2024
  9. Activity-based payments: alternative (anonymous) online payment model

    Electronic payments are the cornerstone of web-based commerce. A steady decrease in cash usage has been observed, while various digital payment...

    Article 03 February 2024
  10. Designing an Attribute-Based Encryption Scheme with an Enhanced Anonymity Model for Privacy Protection in E-Health

    The medical field and the health care industry generate large volumes of data that are ultimately beneficial to society. Yet, the exposure of...

    Kirtirajsinh Zala, Hiren Kumar Thakkar, ... Deep Thumar in SN Computer Science
    Article 13 January 2024
  11. Manipulable, reversible and diversified de-identification via face identity disentanglement

    Face de-identification has always been a focal point in privacy-preserving research. Most existing de-identification methods focus only on the...

    Di **ao, **gdong **a, ... Maolan Zhang in Multimedia Tools and Applications
    Article 19 February 2024
  12. Proxy signature-based role delegation scheme: formal analysis and simulation

    In the security domain, wide variety of signature schemes are available for providing confidentiality, Integrity and non-repudiation. Proxy signature...

    Aparna Bannore, Rachana Y. Patil, ... Himani Deshpande in International Journal of Information Technology
    Article 14 May 2024
  13. A Trajectory-Privacy Protection Method Based on Location Similarity of Query Destinations in Continuous LBS Queries

    In the continuous location-based service (LBS) queries, the trajectory k-anonymity method that incorporates user’s moving trend is becoming popular...
    Lu Zhang, Saide Zhu, ... Wei Li in Wireless Algorithms, Systems, and Applications
    Conference paper 2020
  14. A General Algorithm for k-anonymity on Dynamic Databases

    In this work we present an algorithm for k-anonymization of datasets that are changing over time. It is intended for preventing identity disclosure...
    Conference paper Open access 2018
  15. Analyzing processing time and load factor: 5-node mix network with ElGamal encryption and XOR shuffling

    To provide anonymous communication, this paper proposes the implementation of a 5-node mix network using ElGamal encryption and XOR Shuffling. An...

    Fayaz Ahmad Naikoo, Khaleel Ahmad, Khairol Amali Bin Ahmad in International Journal of Information Technology
    Article 13 July 2024
  16. LPPRS: New Location Privacy Preserving Schemes Based on Ring Signature over Mobile Social Networks

    There are two popular location-based service (LBS) applications: searching k-nearest neighbor Points of Interests (kNN POIs) and finding Nearby...
    Cailing Cai, Tsz Hon Yuen, ... Siu-Ming Yiu in Information Security and Cryptology
    Conference paper 2021
  17. Threshold ring signature: generic construction and logarithmic size instantiation

    A ring signature is a variant of normal digital signature and protects the privacy of a specific signer in the sense that a ring signature can be...

    Huizhuo Wang, Yang Tao, Rui Zhang in Cybersecurity
    Article Open access 11 July 2024
  18. Hilbert curves-based location privacy technique for vehicular cloud networks

    Location privacy (LP) plays an important role in location-based services (LBS) offered by different service providers. Many applications request...

    Hani Al-Balasmeh, Maninder Singh, Raman Singh in Cluster Computing
    Article 11 July 2023
  19. PRIBANI: a privacy-ensured framework for blockchain transactions with information retrieval

    The advent of blockchain technology has revolutionized Internet-of-Thing (IoT) systems offering immutable and transparent ledger mechanisms. However,...

    Archana Chhabra, Rahul Saha, Gulshan Kumar in Cluster Computing
    Article 08 April 2024
  20. Anonymization of Faces

    Fabio Hellmann, Elisabeth André, ... Silvan Mertes in Datenschutz und Datensicherheit - DuD
    Article Open access 31 May 2024
Did you find what you were looking for? Share feedback.