Articles with "privacy protection" as a keyword



Photo by dtopkin1 from unsplash

Privacy protection in smart meters using homomorphic encryption: An overview

Sign Up to like & get
recommendations!
Published in 2022 at "Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery"

DOI: 10.1002/widm.1469

Abstract: This article presents an overview of the literature on privacy protection in smart meters with a particular focus on homomorphic encryption (HE). Firstly, we introduce the concept of smart meters, the context in which they… read more here.

Keywords: homomorphic encryption; smart meters; privacy; privacy protection ... See more keywords
Photo by organicdesignco from unsplash

Towards privacy protection and malicious behavior traceability in smart health

Sign Up to like & get
recommendations!
Published in 2017 at "Personal and Ubiquitous Computing"

DOI: 10.1007/s00779-017-1047-8

Abstract: As a more ubiquitous concept, smart health (s-health) is the context-aware complement of mobile health within smart cities, and it has made an increasing number of people turn to cloud-based services. In a practical s-health… read more here.

Keywords: smart health; system; health; privacy protection ... See more keywords
Photo by dtopkin1 from unsplash

A location privacy protection scheme based on random encryption period for VSNs

Sign Up to like & get
recommendations!
Published in 2020 at "Journal of Ambient Intelligence and Humanized Computing"

DOI: 10.1007/s12652-019-01227-z

Abstract: Vehicle social networks (VSNs) are VANETs characterized by social aspect. For VSNs, it’s very crucial to ensure its location privacy. Pseudonym is considered as an effective way to resist adversary’s tracking, which ensures that each… read more here.

Keywords: scheme; privacy protection; location privacy; location ... See more keywords
Photo from wikipedia

Asymmetrical transmission windows for daily privacy protection using cholesteric liquid crystals

Sign Up to like & get
recommendations!
Published in 2020 at "Optics and Laser Technology"

DOI: 10.1016/j.optlastec.2019.105778

Abstract: Abstract A method for realizing an asymmetrical transmission window (ATW) for daily privacy protection using cholesteric liquid crystals (CLCs) is demonstrated. People outside a private space can see people inside through a common window. To… read more here.

Keywords: privacy; protection using; private space; privacy protection ... See more keywords
Photo from wikipedia

Privacy protection measures for randomized response surveys on stigmatizing continuous variables

Sign Up to like & get
recommendations!
Published in 2018 at "Journal of Applied Statistics"

DOI: 10.1080/02664763.2018.1440540

Abstract: Abstract We consider the situation where sample surveys are to be undertaken on sensitive or stigmatizing issues. For such surveys, direct questioning methods usually lead to non-compliance or incorrect responses and so, the randomized response… read more here.

Keywords: protection measures; protection; privacy protection; randomized response ... See more keywords
Photo from wikipedia

The privacy protection scale in obstetrics and gynecology: a scale development study.

Sign Up to like & get
recommendations!
Published in 2022 at "Health care for women international"

DOI: 10.1080/07399332.2022.2081329

Abstract: The purpose of the authors was to develop a valid and reliable measurement tool for assessing the status of privacy protection. This study was conducted methodologically. This scale was tested with 500 healthcare professionals who… read more here.

Keywords: obstetrics; privacy protection; study; scale ... See more keywords
Photo by tobiastu from unsplash

A Lightweight Encryption Method for Privacy Protection in Surveillance Videos

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Access"

DOI: 10.1109/access.2018.2820724

Abstract: Privacy protection of surveillance videos is an important issue because of the pervasiveness of surveillance cameras. Region of interest (RoI) privacy protection prefers encrypting limited privacy-sensitive areas to encrypting the entire video because of the… read more here.

Keywords: privacy; surveillance videos; privacy protection;
Photo by dtopkin1 from unsplash

Location Correlated Differential Privacy Protection Based on Mobile Feature Analysis

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Access"

DOI: 10.1109/access.2019.2912006

Abstract: Recently, with the popularity of smartphones and other GPS embedded devices, location-based service applications are being rapidly developed. In addition, individual privacy protection is also receiving increasing attention. Currently, most studies assume that individual location… read more here.

Keywords: privacy protection; location; location correlated; privacy ... See more keywords
Photo by dtopkin1 from unsplash

T-SR: A Location Privacy Protection Algorithm Based on POI Query

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Access"

DOI: 10.1109/access.2019.2913547

Abstract: With the popularity of location-based services in the field of mobile network applications, users enjoy the convenience on one side, they may face the risk of privacy disclosure on the other side. Attackers can easily… read more here.

Keywords: location privacy; privacy protection; location; user location ... See more keywords
Photo from wikipedia

A New Weight and Sensitivity Based Variable Maximum Distance to Average Vector Algorithm for Wearable Sensor Data Privacy Protection

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Access"

DOI: 10.1109/access.2019.2927386

Abstract: The problem of privacy protection of wearable devices when publishing data can be solved based on the variable-maximum distance average vector. This paper proposes a new weight and sensitivity based variable maximum distance average vector… read more here.

Keywords: variable maximum; distance; based variable; privacy protection ... See more keywords
Photo by campaign_creators from unsplash

Privacy Protection Framework for Android

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3142345

Abstract: The increase in popularity and users of the Android platform in recent years has led to a lot of innovative and smart Android applications (apps). Many of these apps are highly interactive, customizable, and require… read more here.

Keywords: privacy; privacy protection; user data; protection framework ... See more keywords