UP - logo

Rezultati iskanja

Osnovno iskanje    Izbirno iskanje   
Iskalna
zahteva
Knjižnica

Trenutno NISTE avtorizirani za dostop do e-virov UPUK. Za polni dostop se PRIJAVITE.

1 2 3 4 5
zadetkov: 5.200
21.
  • Privacy Preserving Location... Privacy Preserving Location Data Publishing: A Machine Learning Approach
    Shaham, Sina; Ding, Ming; Liu, Bo ... IEEE transactions on knowledge and data engineering, 2021-Sept.-1, 2021-9-1, Letnik: 33, Številka: 9
    Journal Article
    Recenzirano
    Odprti dostop

    Publishing datasets plays an essential role in open data research and promoting transparency of government agencies. However, such data publication might reveal users' private information. One of the ...
Celotno besedilo

PDF
22.
  • Design and analysis of ligh... Design and analysis of lightweight anonymity protocol for host- and AS-level anonymity
    Yoshinaka, Yutaro; Takemasa, Junji; Koizumi, Yuki ... Computer networks (Amsterdam, Netherlands : 1999), February 2023, 2023-02-00, Letnik: 222
    Journal Article
    Recenzirano

    Lightweight anonymity protocols in the network layer are promising in terms of high throughput and low latency. The realistic and weak assumption of local adversaries deletes the need for hop-by-hop ...
Celotno besedilo
23.
  • A robust and anonymous pati... A robust and anonymous patient monitoring system using wireless medical sensor networks
    Amin, Ruhul; Islam, SK Hafizul; Biswas, G.P. ... Future generation computer systems, March 2018, 2018-03-00, Letnik: 80
    Journal Article
    Recenzirano

    In wireless medical sensor network (WMSN), bio-sensors are implanted within the patient body to sense the sensitive information of a patient which later on can be transmitted to the remote medical ...
Celotno besedilo
24.
  • Cloud-aided lightweight cer... Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks
    Shen, Jian; Gui, Ziyuan; Ji, Sai ... Journal of network and computer applications, 03/2018, Letnik: 106
    Journal Article
    Recenzirano
    Odprti dostop

    With the development of cloud computing and wireless body area networks (WBANs), wearable equipments are able to become new intelligent terminals to provide services for users, which plays an ...
Celotno besedilo
25.
  • A lightweight and robust tw... A lightweight and robust two-factor authentication scheme for personalized healthcare systems using wireless medical sensor networks
    Wu, Fan; Li, Xiong; Sangaiah, Arun Kumar ... Future generation computer systems, 20/May , Letnik: 82
    Journal Article
    Recenzirano

    Wireless Sensor Network (WSN) is a very important part of Internet of Things (IoT), especially in e-healthcare applications. Among them, wireless medical sensor networks (WMSNs) have been used in the ...
Celotno besedilo
26.
  • Focus group methodology: so... Focus group methodology: some ethical challenges
    Sim, Julius; Waterfield, Jackie Quality & quantity, 11/2019, Letnik: 53, Številka: 6
    Journal Article
    Recenzirano
    Odprti dostop

    Focus group methodology generates distinct ethical challenges that do not correspond fully to those raised by one-to-one interviews. This paper explores, in both conceptual and practical terms, three ...
Celotno besedilo

PDF
27.
  • APPA: An anonymous and priv... APPA: An anonymous and privacy preserving data aggregation scheme for fog-enhanced IoT
    Guan, Zhitao; Zhang, Yue; Wu, Longfei ... Journal of network and computer applications, 01/2019, Letnik: 125
    Journal Article
    Recenzirano

    Fog computing is a modern computing platform that connects the cloud with the edge smart devices located at the edge of the network. The fog computing platform has several characteristics desirable ...
Celotno besedilo
28.
  • A trajectory privacy-preser... A trajectory privacy-preserving scheme based on a dual-K mechanism for continuous location-based services
    Zhang, Shaobo; Mao, Xinjun; Choo, Kim-Kwang Raymond ... Information sciences, July 2020, 2020-07-00, Letnik: 527
    Journal Article
    Recenzirano

    •We present a DKM scheme to protect the users’ trajectory privacy for continuous LBSs.•We design the location selection mechanism to obfuscate the users’ real query location.•We utilize the dynamic ...
Celotno besedilo
29.
  • ASA: Against statistical at... ASA: Against statistical attacks for privacy-aware users in Location Based Service
    Sun, Yanming; Chen, Min; Hu, Long ... Future generation computer systems, 20/May , Letnik: 70
    Journal Article
    Recenzirano

    The fusion of mobile devices and social networks is stimulating a wider use of Location Based Service (LBS) and makes it become an important part in our daily life. However, the problem of privacy ...
Celotno besedilo
30.
  • Blockchain-Based Anonymous ... Blockchain-Based Anonymous Authentication With Key Management for Smart Grid Edge Computing Infrastructure
    Wang, Jing; Wu, Libing; Choo, Kim-Kwang Raymond ... IEEE transactions on industrial informatics, 03/2020, Letnik: 16, Številka: 3
    Journal Article
    Odprti dostop

    Achieving low latency and providing real-time services are two of several key challenges in conventional cloud-based smart grid systems, and hence, there has been an increasing trend of moving to ...
Celotno besedilo

PDF
1 2 3 4 5
zadetkov: 5.200

Nalaganje filtrov