|
|
|
Hyundo Yoon, Soojung Moon, Youngki Kim, Changhee Hahn, Wonjun Lee and Junbeom Hur
Public key encryption with keyword search (PEKS) enables users to search over encrypted data outsourced to an untrusted server. Unfortunately, updates to the outsourced data may incur information leakage by exploiting the previously submitted queries. Pr...
ver más
|
|
|
|
|
|
|
Qingfeng Jiang, Kun Deng, Lei Zhang and Chun Liu
In the utility-based routing protocol of delay-tolerant networks (DTNs), nodes calculate routing utility value by encounter time, frequency, and so on, and then forward messages according to the utility. The privacy information of encounter time and freq...
ver más
|
|
|
|
|
|
|
Konstantinos Demertzis, Konstantinos Rantos and George Drosatos
The evolution of the Internet of Things is significantly affected by legal restrictions imposed for personal data handling, such as the European General Data Protection Regulation (GDPR). The main purpose of this regulation is to provide people in the di...
ver más
|
|
|
|
|
|
|
Shunfang Hu, Shaoping Jiang, Qing Miao, Fan Yang, Weihong Zhou and Peng Duan
With the rise of the Internet of Things (IoT), maintaining data confidentiality and protecting user privacy have become increasingly challenging. End devices in the IoT are often deployed in unattended environments and connected to open networks, making ...
ver más
|
|
|
|
|
|
|
Mira Lee and Minhye Seo
Cloud storage services have become indispensable in resolving the constraints of local storage and ensuring data accessibility from anywhere at any time. Data deduplication technology is utilized to decrease storage space and bandwidth requirements. This...
ver más
|
|
|
|
|
|
|
Veronika Belcheva, Tatiana Ermakova and Benjamin Fabian
Privacy policies are the main method for informing Internet users of how their data are collected and shared. This study aims to analyze the deficiencies of privacy policies in terms of readability, vague statements, and the use of pacifying phrases conc...
ver más
|
|
|
|
|
|
|
Harshvardhan J. Pandit
Solid is a new radical paradigm based on decentralising control of data from central organisations to individuals that seeks to empower individuals to have active control of who and how their data is being used. In order to realise this vision, the use-c...
ver más
|
|
|
|
|
|
|
Peng Xi, Xinglong Zhang, Lian Wang, Wenjuan Liu and Shaoliang Peng
Medical data contains multiple records of patient data that are important for subsequent treatment and future research. However, it needs to be stored and shared securely to protect the privacy of the data. Blockchain is widely used in the management of ...
ver más
|
|
|
|
|
|
|
Danilo Pau, Andrea Pisani and Antonio Candelieri
In the context of TinyML, many research efforts have been devoted to designing forward topologies to support On-Device Learning. Reaching this target would bring numerous advantages, including reductions in latency and computational complexity, stronger ...
ver más
|
|
|
|
|
|
|
Ching-Nam Hang, Yi-Zhen Tsai, Pei-Duo Yu, Jiasi Chen and Chee-Wei Tan
The rapid global spread of the coronavirus disease (COVID-19) has severely impacted daily life worldwide. As potential solutions, various digital contact tracing (DCT) strategies have emerged to mitigate the virus?s spread while maintaining economic and ...
ver más
|
|
|
|
|
|
|
Abubakar Ahmad Musa, Adamu Hussaini, Cheng Qian, Yifan Guo and Wei Yu
The Internet of Things (IoT) constitutes a vast network comprising various components such as physical devices, vehicles, buildings, and other items equipped with sensors, actuators, and software. These components are interconnected, facilitating the col...
ver más
|
|
|
|
|
|
|
Wenbin Li, Hakim Hacid, Ebtesam Almazrouei and Merouane Debbah
The union of Edge Computing (EC) and Artificial Intelligence (AI) has brought forward the Edge AI concept to provide intelligent solutions close to the end-user environment, for privacy preservation, low latency to real-time performance, and resource opt...
ver más
|
|
|
|
|
|
|
Jing Chen, Tong Li and Rui Zhu
False messages sent by malicious or selfish vehicle nodes will reduce the operation efficiency of the Internet of Vehicles, and can even endanger drivers in serious cases. Therefore, it is very important to detect malicious vehicle nodes in the network i...
ver más
|
|
|
|
|
|
|
Jameel Almalki, Waleed Al Shehri, Rashid Mehmood, Khalid Alsaif, Saeed M. Alshahrani, Najlaa Jannah and Nayyar Ahmed Khan
Significant modifications have been seen in healthcare facilities over the past two decades. With the use of IoT-enabled devices, the monitoring and analysis of patient diagnostic parameters is made considerably easy. The new technology shift for medical...
ver más
|
|
|
|
|
|
|
Zixin Dou, Yanming Sun, Zhidong Wu, Tao Wang, Shiqi Fan and Yuxuan Zhang
In the era of big data, mass customization (MC) systems are faced with the complexities associated with information explosion and management control. Thus, it has become necessary to integrate the mass customization system and Social Internet of Things, ...
ver más
|
|
|
|
|
|
|
Chin-Ling Chen, Yong-Yuan Deng, Wei Weng, Hongyu Sun and Ming Zhou
In recent years, blockchain-related technologies and applications have gradually emerged. Blockchain technology is essentially a decentralized database maintained by the collective, and it is now widely applied in various fields. At the same time, with t...
ver más
|
|
|
|
|
|
|
Fatima Mohamed AlMarzooqi, Immanuel Azaad Moonesar and Raeda AlQutob
Introduction: Dubai city made a significant leap forward, which aligns with the vision of leadership, in the region?s eHealth services by adopting a unified electronic medical record system across the country. Electronic medical records provide a better,...
ver más
|
|
|
|
|
|
|
Ahmed Faeq Hussein, Abbas K. ALZubaidi, Qais Ahmed Habash and Mustafa Musa Jaber
A crucial role is played by personal biomedical data when it comes to maintaining proficient access to health records by patients as well as health professionals. However, it is difficult to get a unified view pertaining to health data that have been sca...
ver más
|
|
|
|
|
|
|
Samira Sahel,Tasmia Anwar,Barnali Nandi
Pág. 1 - 6
With the phenomenal growth and rapid pervasion of E-commerce observed in recent time, it becomes crucial on the part of the online retailers in Bangladesh to develop an evaluation criteria system in order to keep up with the fierce competition as well as...
ver más
|
|
|
|
|
|
|
Karl van der Schyff, Greg Foster, Karen Renaud and Stephen Flowerday
Online users are responsible for protecting their online privacy themselves: the mantra is custodiat te (protect yourself). Even so, there is a great deal of evidence pointing to the fact that online users generally do not act to preserve the privacy of ...
ver más
|
|
|
|