UNI-MB - logo
UMNIK - logo
 

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources UM. For full access, REGISTER.

48 49 50
hits: 174,745
491.
Full text
492.
  • The CARE Theory of Dignity ... The CARE Theory of Dignity Amid Personal Data Digitalization
    Leidner, Dorothy E.; Tona, Olgerta MIS quarterly, 03/2021, Volume: 45, Issue: 1
    Journal Article
    Peer reviewed

    With the rapidly evolving permeation of digital technologies into everyday human life, we are witnessing an era of personal data digitalization. Personal data digitalization refers to the ...
Full text
493.
  • Big Privacy: Challenges and... Big Privacy: Challenges and Opportunities of Privacy Study in the Age of Big Data
    Yu, Shui IEEE access, 2016, Volume: 4
    Journal Article
    Peer reviewed
    Open access

    One of the biggest concerns of big data is privacy. However, the study on big data privacy is still at a very early stage. We believe the forthcoming solutions and theories of big data privacy root ...
Full text

PDF
494.
  • Differentially private part... Differentially private partition selection
    Desfontaines, Damien; Voss, James; Gipson, Bryant ... Proceedings on Privacy Enhancing Technologies, 01/2022, Volume: 2022, Issue: 1
    Journal Article
    Peer reviewed
    Open access

    Many data analysis operations can be expressed as a GROUP BY query on an unbounded set of partitions, followed by a per-partition aggregation. To make such a query differentially private, adding ...
Full text

PDF
495.
  • A Utility-Aware Visual Appr... A Utility-Aware Visual Approach for Anonymizing Multi-Attribute Tabular Data
    Wang, Xumeng; Chou, Jia-Kai; Chen, Wei ... IEEE transactions on visualization and computer graphics, 2018-Jan., 2018-01-00, 2018-1-00, 20180101, Volume: 24, Issue: 1
    Journal Article
    Peer reviewed

    Sharing data for public usage requires sanitization to prevent sensitive information from leaking. Previous studies have presented methods for creating privacy preserving visualizations. However, few ...
Full text
496.
  • Cloak: Hiding Retrieval Inf... Cloak: Hiding Retrieval Information in Blockchain Systems via Distributed Query Requests
    Xiao, Jiang; Chang, Jian; Lin, Licheng ... IEEE transactions on services computing, 06/2024
    Journal Article
    Peer reviewed
    Open access

    The privacy-preserving query is critical for modern blockchain systems, especially when supporting many crucial applications such as finance and healthcare. Recent advances in blockchain query ...
Full text
497.
Full text
498.
Full text

PDF
499.
  • PRIVACY PROTECTION IN THE DIGITAL AGE: A CRIMINAL LAW PERSPECTIVE
    Marcinauskaitė, Renata; Razmetaeva, Yulia International Comparative Jurisprudence (Online), 2021, Volume: 7, Issue: 2
    Journal Article
    Peer reviewed
    Open access

    Privacy as a fundamental right faces considerable challenges as people’s activities have moved into cyberspace. The development of technology has had an impact on a various areas related to personal ...
Full text
500.
  • TIDY: Publishing a Time Int... TIDY: Publishing a Time Interval Dataset With Differential Privacy
    Jung, Woohwan; Kwon, Suyong; Shim, Kyuseok IEEE transactions on knowledge and data engineering, 2021-May-1, 2021-5-1, Volume: 33, Issue: 5
    Journal Article
    Peer reviewed

    Log data from mobile devices generally contain a series of events with temporal information including time intervals which consist of the start and finish times. However, the problem of releasing ...
Full text

You have reached the maximum number of search results that are displayed.

  • For better performance, the search offers a maximum of 1,000 results per query (or 50 pages if the option 10/page is selected).
  • Consider using result filters or changing the sort order to explore your results further.
48 49 50
hits: 174,745

Load filters