NUK - logo

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources NUK. For full access, REGISTER.

1 2 3 4 5
hits: 7,540
1.
  • An efficient privacy mechan... An efficient privacy mechanism for electronic health records
    Anjum, Adeel; Malik, Saif ur Rehman; Choo, Kim-Kwang Raymond ... Computers & security, January 2018, 2018-01-00, 20180101, Volume: 72
    Journal Article
    Peer reviewed
    Open access

    Electronic health records (EHRs), digitization of patients' health record, offer many advantages over traditional ways of keeping patients' records, such as easing data management and facilitating ...
Full text
2.
  • Enhancing privacy through u... Enhancing privacy through uniform grid and caching in location-based services
    Zhang, Shaobo; Choo, Kim-Kwang Raymond; Liu, Qin ... Future generation computer systems, September 2018, 2018-09-00, Volume: 86
    Journal Article
    Peer reviewed

    With the increasing popularity of location-based services (LBSs), there is a corresponding increase in the potential for location privacy leakage. Existing solutions generally introduce a ...
Full text
3.
  • AVeCQ: Anonymous Verifiable... AVeCQ: Anonymous Verifiable Crowdsourcing with Worker Qualities
    Koutsos, Vlasis; Damle, Sankarshan; Papadopoulos, Dimitrios ... IEEE transactions on dependable and secure computing, 2024
    Journal Article
    Open access

    In crowdsourcing systems, requesters publish tasks, and interested workers provide answers to get rewards. Worker anonymity motivates participation since it protects their privacy. Anonymity with ...
Full text
4.
  • Comprehensive Anonymity Tri... Comprehensive Anonymity Trilemma: User Coordination is not enough
    Das, Debajyoti; Meiser, Sebastian; Mohammadi, Esfandiar ... Proceedings on Privacy Enhancing Technologies, 07/2020, Volume: 2020, Issue: 3
    Journal Article
    Peer reviewed
    Open access

    For anonymous communication networks (ACNs), Das et al. recently confirmed a long-suspected trilemma result that ACNs cannot achieve strong anonymity, low latency overhead and low bandwidth overhead ...
Full text

PDF
5.
  • Privacy preservation in per... Privacy preservation in permissionless blockchain: A survey
    Peng, Li; Feng, Wei; Yan, Zheng ... Digital communications and networks, 08/2021, Volume: 7, Issue: 3
    Journal Article
    Peer reviewed
    Open access

    Permissionless blockchain, as a kind of distributed ledger, has gained considerable attention because of its openness, transparency, decentralization, and immutability. Currently, permissionless ...
Full text

PDF
6.
  • Security, privacy and trust... Security, privacy and trust of different layers in Internet-of-Things (IoTs) framework
    Tewari, Aakanksha; Gupta, B.B. Future generation computer systems, July 2020, 2020-07-00, Volume: 108
    Journal Article
    Peer reviewed

    Internet of Things (IoT) is playing an important role after its showing up, it covers from traditional equipment to general household objects such as WSNs and RFID. With the great potential of IoT, ...
Full text
7.
  • Performance and Security Im... Performance and Security Improvements for Tor
    Alsabah, Mashael; Goldberg, Ian ACM computing surveys, 06/2017, Volume: 49, Issue: 2
    Journal Article
    Peer reviewed

    Tor Dingledine et al. 2004 is the most widely used anonymity network today, serving millions of users on a daily basis using a growing number of volunteer-run routers. Since its deployment in 2003, ...
Full text
8.
  • Blockchain Enabled Trust-Ba... Blockchain Enabled Trust-Based Location Privacy Protection Scheme in VANET
    Luo, Bin; Li, Xinghua; Weng, Jian ... IEEE transactions on vehicular technology, 02/2020, Volume: 69, Issue: 2
    Journal Article
    Peer reviewed

    While enjoying the convenience brought by Location Based Service (LBS), the location privacy of vehicles in VANET may be disclosed. Distributed k-anonymity, as one of the most popular privacy ...
Full text
9.
  • Background knowledge attack... Background knowledge attacks in privacy-preserving data publishing models
    Desai, Nidhi; Lal Das, Manik; Chaudhari, Payal ... Computers & security, November 2022, 2022-11-00, Volume: 122
    Journal Article
    Peer reviewed

    Massive volumes of data are being generated at every moment through various sources in the cyber-physical world. While storing as well as facilitating these data for business or individual ...
Full text
10.
  • Tor, what is it good for? P... Tor, what is it good for? Political repression and the use of online anonymity-granting technologies
    Jardine, Eric New media & society, 02/2018, Volume: 20, Issue: 2
    Journal Article
    Peer reviewed

    Why do people use anonymity-granting technologies when surfing the Internet? Anecdotal evidence suggests that people often resort to using online anonymity services, like the Tor network, because ...
Full text
1 2 3 4 5
hits: 7,540

Load filters