UP - logo

Rezultati iskanja

Osnovno iskanje    Izbirno iskanje   
Iskalna
zahteva
Knjižnica

Trenutno NISTE avtorizirani za dostop do e-virov UPUK. Za polni dostop se PRIJAVITE.

1 2 3 4 5
zadetkov: 5.193
1.
  • An efficient privacy mechan... An efficient privacy mechanism for electronic health records
    Anjum, Adeel; Malik, Saif ur Rehman; Choo, Kim-Kwang Raymond ... Computers & security, January 2018, 2018-01-00, 20180101, Letnik: 72
    Journal Article
    Recenzirano
    Odprti dostop

    Electronic health records (EHRs), digitization of patients' health record, offer many advantages over traditional ways of keeping patients' records, such as easing data management and facilitating ...
Celotno besedilo
2.
  • AVeCQ: Anonymous Verifiable... AVeCQ: Anonymous Verifiable Crowdsourcing with Worker Qualities
    Koutsos, Vlasis; Damle, Sankarshan; Papadopoulos, Dimitrios ... IEEE transactions on dependable and secure computing, 2024
    Journal Article
    Odprti dostop

    In crowdsourcing systems, requesters publish tasks, and interested workers provide answers to get rewards. Worker anonymity motivates participation since it protects their privacy. Anonymity with ...
Celotno besedilo
3.
  • Enhancing privacy and secur... Enhancing privacy and security in 5G networks with an anonymous handover protocol based on Blockchain and Zero Knowledge Proof
    Haddad, Zaher Computer networks (Amsterdam, Netherlands : 1999), August 2024, 2024-08-00, Letnik: 250
    Journal Article
    Recenzirano

    The latest advancement in cellular technology, 5G, has the ability to facilitate various applications such as Device-to-Device (D2D) communication, vehicular communications, and the Internet of ...
Celotno besedilo
4.
  • Comprehensive Anonymity Tri... Comprehensive Anonymity Trilemma: User Coordination is not enough
    Das, Debajyoti; Meiser, Sebastian; Mohammadi, Esfandiar ... Proceedings on Privacy Enhancing Technologies, 07/2020, Letnik: 2020, Številka: 3
    Journal Article
    Recenzirano
    Odprti dostop

    For anonymous communication networks (ACNs), Das et al. recently confirmed a long-suspected trilemma result that ACNs cannot achieve strong anonymity, low latency overhead and low bandwidth overhead ...
Celotno besedilo

PDF
5.
  • Personalized extended (α, k... Personalized extended (α, k)‐anonymity model for privacy‐preserving data publishing
    Liu, Xiangwen; Xie, Qingqing; Wang, Liangmin Concurrency and computation, 25 March 2017, Letnik: 29, Številka: 6
    Journal Article
    Recenzirano

    Summary General (α, k)‐anonymity model is a widely used method in privacy‐preserving data publishing, but it cannot provide personalized anonymity. At present, two main schemes for personalized ...
Celotno besedilo
6.
  • Privacy preservation in per... Privacy preservation in permissionless blockchain: A survey
    Peng, Li; Feng, Wei; Yan, Zheng ... Digital communications and networks, 08/2021, Letnik: 7, Številka: 3
    Journal Article
    Recenzirano
    Odprti dostop

    Permissionless blockchain, as a kind of distributed ledger, has gained considerable attention because of its openness, transparency, decentralization, and immutability. Currently, permissionless ...
Celotno besedilo

PDF
7.
  • Performance and Security Im... Performance and Security Improvements for Tor
    Alsabah, Mashael; Goldberg, Ian ACM computing surveys, 06/2017, Letnik: 49, Številka: 2
    Journal Article
    Recenzirano

    Tor Dingledine et al. 2004 is the most widely used anonymity network today, serving millions of users on a daily basis using a growing number of volunteer-run routers. Since its deployment in 2003, ...
Celotno besedilo
8.
  • Security, privacy and trust... Security, privacy and trust of different layers in Internet-of-Things (IoTs) framework
    Tewari, Aakanksha; Gupta, B.B. Future generation computer systems, July 2020, 2020-07-00, Letnik: 108
    Journal Article
    Recenzirano

    Internet of Things (IoT) is playing an important role after its showing up, it covers from traditional equipment to general household objects such as WSNs and RFID. With the great potential of IoT, ...
Celotno besedilo
9.
  • Blockchain Enabled Trust-Ba... Blockchain Enabled Trust-Based Location Privacy Protection Scheme in VANET
    Luo, Bin; Li, Xinghua; Weng, Jian ... IEEE transactions on vehicular technology, 02/2020, Letnik: 69, Številka: 2
    Journal Article
    Recenzirano

    While enjoying the convenience brought by Location Based Service (LBS), the location privacy of vehicles in VANET may be disclosed. Distributed k-anonymity, as one of the most popular privacy ...
Celotno besedilo
10.
  • Background knowledge attack... Background knowledge attacks in privacy-preserving data publishing models
    Desai, Nidhi; Lal Das, Manik; Chaudhari, Payal ... Computers & security, November 2022, 2022-11-00, Letnik: 122
    Journal Article
    Recenzirano

    Massive volumes of data are being generated at every moment through various sources in the cyber-physical world. While storing as well as facilitating these data for business or individual ...
Celotno besedilo
1 2 3 4 5
zadetkov: 5.193

Nalaganje filtrov