We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 3,884 results
  1. Privacy-preserving V2I communication and secure authentication using ECC with physical unclonable function

    In recent years, service provided based on the location has brought a tremendous change in our lives. However, one of the biggest challenges is to...

    Iqra Nawaz, Munam Ali Shah, ... Seunggil Jeon in Wireless Networks
    Article 08 March 2024
  2. RETRACTED ARTICLE: Research on privacy and secure storage protection of personalized medical data based on hybrid encryption

    Personalized medical data privacy and secure storage protection face serious challenges, especially in terms of data security and storage efficiency....

    Article Open access 02 January 2024
  3. PPSecS: Privacy-Preserving Secure Big Data Storage in a Cloud Environment

    The proliferation of social networks, the Internet of Things, and economic mobility has led to an exponential increase in data. New data having high...

    Imene Bouleghlimat, Souheila Boudouda, Salima Hacini in Arabian Journal for Science and Engineering
    Article 29 May 2023
  4. A new method for privacy preserving association rule mining using homomorphic encryption with a secure communication protocol

    With the enormous amount of data growing exponentially, data owners aim to share data with each other to acquire an enhanced analytic view of their...

    S. Zehtabchi, N. Daneshpour, M. Safkhani in Wireless Networks
    Article 21 November 2022
  5. A hybrid data perturbation and mean clustering approach based privacy preserving classification model for large databases

    Privacy preserving in large databases plays a vital role for the clustering and classification process. Since, most of the traditional models are...

    Article 26 December 2022
  6. CADEN: cellular automata and DNA based secure framework for privacy preserving in IoT based healthcare

    In the present E-healthcare industry, data breaches result in substantial economic losses due to cyber-attacks and hence create a trust deficit...

    Nasir N. Hurrah, Ekram Khan, Uzma Khan in Journal of Ambient Intelligence and Humanized Computing
    Article 26 December 2022
  7. Secure shortest distance queries over encrypted graph in cloud computing

    Graph databases have received increased interests as many applications are handled as graph problems. Shortest distance queries are one of the...

    **g**g Guo, Jiacong Sun in Wireless Networks
    Article 29 February 2024
  8. Fedlabx: a practical and privacy-preserving framework for federated learning

    Federated learning (FL) draws attention in academia and industry due to its privacy-preserving capability in training machine learning models....

    Yu** Yan, Mohammed B. M. Kamel, ... Ákos Tényi in Complex & Intelligent Systems
    Article Open access 31 July 2023
  9. An Analysis of Ethics-Based Foundation and Regulatory Issues for Genomic Data Privacy

    The ethical issues raised by the privacy of bioinformatics data storage are the core of our investigation. The storage, use, and sharing of genomic...

    Yesodhai Balagurunathan, Raja Rajeswari Sethuraman in Journal of The Institution of Engineers (India): Series B
    Article 23 April 2024
  10. Reconciling privacy and accuracy in AI for medical imaging

    Artificial intelligence (AI) models are vulnerable to information leakage of their training data, which can be highly sensitive, for example, in...

    Alexander Ziller, Tamara T. Mueller, ... Georgios Kaissis in Nature Machine Intelligence
    Article Open access 21 June 2024
  11. Survey and open problems in privacy-preserving knowledge graph: merging, query, representation, completion, and applications

    Knowledge Graph (KG) has attracted more and more companies’ attention for its ability to connect different types of data in meaningful ways and...

    Chaochao Chen, Fei Zheng, ... Jun Zhou in International Journal of Machine Learning and Cybernetics
    Article 02 March 2024
  12. ρi-BLoM: a privacy preserving framework for the industrial IoT based on blockchain and machine learning

    The Industrial Internet of Things (IoT) comes together with different services, industrial applications, sensors, machines, and databases. Industrial...

    Article 20 April 2024
  13. Secure and Privacy Preserving Proxy Biometric Identities

    With large-scale adaption to biometric based applications, security and privacy of biometrics is utmost important especially when operating in...
    Harkeerat Kaur, Rishabh Shukla, ... Pritee Khanna in Advanced Information Networking and Applications
    Conference paper 2023
  14. Enhancing Security and Privacy in Small Drone Networks Using 6G-IOT Driven Cyber Physical System

    The purpose of this abstract is to present a concise summary of a study that sought to enhance the cybersecurity of 6G-IoT drone devices through the...

    Nagarjuna Tandra, C. N. Gireesh Babu, ... S. Ravichandran in Wireless Personal Communications
    Article 17 May 2024
  15. Secure Keyword Search over Encrypted Cloud Data Using Blockchain in Digital Document Sharing

    Due to the drawbacks of the many-to-many search model for accessing digital records in institutional settings like offices, hospitals, and government...

    Garima Verma, Soumen Kanrar in Wireless Personal Communications
    Article 01 January 2024
  16. Location Privacy Preservation for Location Based Service Applications: Taxonomies, Issues and Future Research Directions

    Context-aware computing processes the mobile user’s query/transaction submitted from anywhere at any time. Basically, location based services (LBSs)...

    Ajay K. Gupta, Udai Shanker in Wireless Personal Communications
    Article 01 February 2024
  17. Enabling efficient and verifiable secure search on cloud-based encrypted big data

    Verifiable symmetric searchable encryption schemes have received a lot of attention as they can guarantee the correctness of query results in case of...

    Ruizhong Du, Chenghao Yu, Mingyue Li in Peer-to-Peer Networking and Applications
    Article 28 August 2023
  18. Privacy-Preserving Collaborative Data Mining

    Privacy-preserving data mining is an important issue in the areas of data mining and security. In this paper, we study how to conduct association...
    Justin Zhan, LiWu Chang, Stan Matwin in Foundations and Novel Approaches in Data Mining
    Chapter
  19. A Hybrid Cryptographic Mechanism for Secure Data Transmission in Edge AI Networks

    As Edge AI systems become more prevalent, ensuring data privacy and security in these decentralized networks is essential. In this work, a novel...

    Abdulmohsen Almalawi, Shabbir Hassan, ... Asif Irshad Khan in International Journal of Computational Intelligence Systems
    Article Open access 06 February 2024
  20. Federated Learning and Adaptive Privacy Preserving in Healthcare

    Real-world health data for machine learning tasks addresses many issues related to storage, access and privacy concerns on the centralized databases....
    K. Reddy Madhavi, Vineela Krishna Suri, ... C. Sateesh kumar Reddy in Innovations in Bio-Inspired Computing and Applications
    Conference paper 2023
Did you find what you were looking for? Share feedback.