Sign Up to like & get
recommendations!
1
Published in 2022 at "Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery"
DOI: 10.1002/widm.1469
Abstract: This article presents an overview of the literature on privacy protection in smart meters with a particular focus on homomorphic encryption (HE). Firstly, we introduce the concept of smart meters, the context in which they…
read more here.
Keywords:
homomorphic encryption;
smart meters;
privacy;
privacy protection ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2017 at "Personal and Ubiquitous Computing"
DOI: 10.1007/s00779-017-1047-8
Abstract: As a more ubiquitous concept, smart health (s-health) is the context-aware complement of mobile health within smart cities, and it has made an increasing number of people turn to cloud-based services. In a practical s-health…
read more here.
Keywords:
smart health;
system;
health;
privacy protection ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2020 at "Journal of Ambient Intelligence and Humanized Computing"
DOI: 10.1007/s12652-019-01227-z
Abstract: Vehicle social networks (VSNs) are VANETs characterized by social aspect. For VSNs, it’s very crucial to ensure its location privacy. Pseudonym is considered as an effective way to resist adversary’s tracking, which ensures that each…
read more here.
Keywords:
scheme;
privacy protection;
location privacy;
location ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2020 at "Optics and Laser Technology"
DOI: 10.1016/j.optlastec.2019.105778
Abstract: Abstract A method for realizing an asymmetrical transmission window (ATW) for daily privacy protection using cholesteric liquid crystals (CLCs) is demonstrated. People outside a private space can see people inside through a common window. To…
read more here.
Keywords:
privacy;
protection using;
private space;
privacy protection ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2018 at "Journal of Applied Statistics"
DOI: 10.1080/02664763.2018.1440540
Abstract: Abstract We consider the situation where sample surveys are to be undertaken on sensitive or stigmatizing issues. For such surveys, direct questioning methods usually lead to non-compliance or incorrect responses and so, the randomized response…
read more here.
Keywords:
protection measures;
protection;
privacy protection;
randomized response ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2022 at "Health care for women international"
DOI: 10.1080/07399332.2022.2081329
Abstract: The purpose of the authors was to develop a valid and reliable measurement tool for assessing the status of privacy protection. This study was conducted methodologically. This scale was tested with 500 healthcare professionals who…
read more here.
Keywords:
obstetrics;
privacy protection;
study;
scale ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2018 at "IEEE Access"
DOI: 10.1109/access.2018.2820724
Abstract: Privacy protection of surveillance videos is an important issue because of the pervasiveness of surveillance cameras. Region of interest (RoI) privacy protection prefers encrypting limited privacy-sensitive areas to encrypting the entire video because of the…
read more here.
Keywords:
privacy;
surveillance videos;
privacy protection;
Sign Up to like & get
recommendations!
0
Published in 2019 at "IEEE Access"
DOI: 10.1109/access.2019.2912006
Abstract: Recently, with the popularity of smartphones and other GPS embedded devices, location-based service applications are being rapidly developed. In addition, individual privacy protection is also receiving increasing attention. Currently, most studies assume that individual location…
read more here.
Keywords:
privacy protection;
location;
location correlated;
privacy ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2019 at "IEEE Access"
DOI: 10.1109/access.2019.2913547
Abstract: With the popularity of location-based services in the field of mobile network applications, users enjoy the convenience on one side, they may face the risk of privacy disclosure on the other side. Attackers can easily…
read more here.
Keywords:
location privacy;
privacy protection;
location;
user location ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2019 at "IEEE Access"
DOI: 10.1109/access.2019.2927386
Abstract: The problem of privacy protection of wearable devices when publishing data can be solved based on the variable-maximum distance average vector. This paper proposes a new weight and sensitivity based variable maximum distance average vector…
read more here.
Keywords:
variable maximum;
distance;
based variable;
privacy protection ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3142345
Abstract: The increase in popularity and users of the Android platform in recent years has led to a lot of innovative and smart Android applications (apps). Many of these apps are highly interactive, customizable, and require…
read more here.
Keywords:
privacy;
privacy protection;
user data;
protection framework ... See more keywords