Articles with "privacy preservation" as a keyword



Photo by britishlibrary from unsplash

Chaotic-map based authenticated security framework with privacy preservation for remote point-of-care

Sign Up to like & get
recommendations!
Published in 2021 at "Multimedia Tools and Applications"

DOI: 10.1007/s11042-020-10134-x

Abstract: The challenge of COVID-19 has become more prevalent across the world. It is highly demanding an intelligent strategy to outline the precaution measures until the clinical trials find a successful vaccine. With technological advancement, Wireless… read more here.

Keywords: point care; chaotic map; privacy preservation; security ... See more keywords
Photo by dtopkin1 from unsplash

Privacy preservation in permissionless blockchain: A survey

Sign Up to like & get
recommendations!
Published in 2020 at "Digital Communications and Networks"

DOI: 10.1016/j.dcan.2020.05.008

Abstract: Abstract Permissionless blockchain, as a kind of distributed ledger, has gained considerable attention because of its openness, transparency, decentralization, and immutability. Currently, permissionless blockchain has shown a good application prospect in many fields, from the… read more here.

Keywords: privacy; privacy preservation; permissionless blockchain;
Photo by radowanrehan from unsplash

Data privacy preservation in MAC aware Internet of things with optimized key generation

Sign Up to like & get
recommendations!
Published in 2019 at "Journal of King Saud University - Computer and Information Sciences"

DOI: 10.1016/j.jksuci.2019.12.008

Abstract: Abstract Recently, the progression in Internet of Thing (IoT) has extensively influenced the model of wireless networking. As numerous wireless devices were emerged, the new Medium Access Control (MAC) and routing protocols has been introduced… read more here.

Keywords: key; algorithm; data privacy; preservation mac ... See more keywords
Photo by dtopkin1 from unsplash

A multi-objective privacy preservation model for cloud security using hybrid Jaya-based shark smell optimization

Sign Up to like & get
recommendations!
Published in 2020 at "Journal of King Saud University - Computer and Information Sciences"

DOI: 10.1016/j.jksuci.2020.10.015

Abstract: Abstract The rising volume of sensitive and personal data being harvested by data controllers has increased the security essentials in the cloud system. The cloud module is not used just to store the data, but… read more here.

Keywords: privacy preservation; shark smell; preservation; security ... See more keywords
Photo from wikipedia

An Empirical Study on the Privacy Preservation of Online Social Networks

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Access"

DOI: 10.1109/access.2018.2822693

Abstract: Privacy in social networks is a large and growing concern in recent times. It refers to various issues in a social network which include privacy of users, links, and their attributes. Each privacy component of… read more here.

Keywords: network; social networks; empirical study; privacy preservation ... See more keywords
Photo from wikipedia

Differential Privacy Preservation in Robust Continual Learning

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3154826

Abstract: Enhancing the privacy of machine learning (ML) algorithms has become crucial with the presence of different types of attacks on AI applications. Continual learning (CL) is a branch of ML with the aim of learning… read more here.

Keywords: differential privacy; privacy; continual learning; robust continual ... See more keywords
Photo from wikipedia

Towards Privacy Preservation using Clustering based Anonymization: Recent Advances and Future Research Outlook

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3175219

Abstract: With the continuous increase in avenues of personal data generation, privacy protection has become a hot research topic resulting in various proposed mechanisms to address this social issue. The main technical solutions for guaranteeing a… read more here.

Keywords: clustering based; privacy; anonymization; privacy preservation ... See more keywords
Photo by cokdewisnu from unsplash

Quantifying the Vulnerability of Attributes for Effective Privacy Preservation Using Machine Learning

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Access"

DOI: 10.1109/access.2023.3235016

Abstract: Personal data have been increasingly used in data-driven applications to improve quality of life. However, privacy preservation of personal data while sharing it with analysts/ researchers has become an essential requirement to be met by… read more here.

Keywords: using machine; quantifying vulnerability; machine learning; privacy ... See more keywords
Photo from wikipedia

Privacy-Preservation Techniques for IoT Devices: A Systematic Mapping Study

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Access"

DOI: 10.1109/access.2023.3245524

Abstract: The Internet of Things (IoT) is becoming a pervasive technology entangled in everyday life. The objective of IoT is to provide ubiquitous access to numerous devices and machines on service providers. However, IoT-based devices may… read more here.

Keywords: techniques iot; preservation techniques; iot devices; privacy preservation ... See more keywords
Photo from wikipedia

Federated Learning for Privacy Preservation in Smart Healthcare Systems: A Comprehensive Survey

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Journal of Biomedical and Health Informatics"

DOI: 10.1109/jbhi.2022.3181823

Abstract: Recent advances in electronic devices and communication infrastructure have revolutionized the traditional healthcare system into a smart healthcare system by using internet of medical things (IoMT) devices. However, due to the centralized training approach of… read more here.

Keywords: federated learning; privacy; smart healthcare; privacy preservation ... See more keywords
Photo by freegraphictoday from unsplash

Autonomous Collaborative Authentication with Privacy Preservation in 6G: From Homogeneity to Heterogeneity

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Network"

DOI: 10.1109/mnet.002.2100312

Abstract: The emerging collaborative authentication schemes are capable of outperforming the conventional isolated methods as a benefit of their multi-dimensional data/information gleaned, but they face new challenges in the sixth generation (6G) wireless networks owing to… read more here.

Keywords: authentication; information; collaborative authentication; privacy ... See more keywords