Suggested Topics within your search.
Suggested Topics within your search.
- Information technology 4
- Moral and ethical aspects 4
- Leadership 3
- Advertising 2
- Customer relations 2
- Customer services 2
- Economic policy 2
- Internet in public administration 2
- Law and legislation 2
- Legal ethics 2
- Online social networks 2
- Public administration 2
- Social media 2
- Aquatic plants 1
- Attitudes 1
- Authoritarianism 1
- Children 1
- Communication 1
- Consumers 1
- Criminal investigation 1
- Cultural policy 1
- Cultural property 1
- Curricula 1
- Curriculum evaluation 1
- Curriculum planning 1
- Data processing 1
- Delivery of Health Care 1
- Diversity in the workplace 1
- Economic Policy 1
- Economics 1
-
741
Recent advances of privacy-preserving machine learning based on (Fully) Homomorphic Encryption
Published 2025-01-01Get full text
Article -
742
Efficient distributed model sharing strategy for data privacy protection in Internet of vehicles
Published 2022-04-01Get full text
Article -
743
All happy families area alike: The EDPS' bridges between competition and privacy
Published 2020-04-01Get full text
Article -
744
Elliptic curve ElGamal encryption based location privacy-preserving scheme
Published 2020-06-01Get full text
Article -
745
Privacy-preserving attribute ticket scheme based on mobile terminal with smart card
Published 2022-10-01Get full text
Article -
746
Justine S. Murison, Faith in Exposure: Privacy and Secularism in the Nineteenth-Century United States
Published 2023-06-01Get full text
Article -
747
Light weighted privacy protection ViT inference framework based on secret sharing
Published 2024-04-01Get full text
Article -
748
-
749
Energy-consumption-balanced efficient source-location privacy preserving protocol in WSN
Published 2016-04-01Get full text
Article -
750
Security control scheme for cloud data copy based on differential privacy model
Published 2017-05-01Get full text
Article -
751
Personalized Federated Learning Scheme for Autonomous Driving Based on Correlated Differential Privacy
Published 2024-12-01Get full text
Article -
752
Blockchain-powered wireless sensor networks: enhancing security and privacy in the IoT era
Published 2023-06-01Get full text
Article -
753
Towards Privacy-Aware and Trustworthy Data Sharing Using Blockchain for Edge Intelligence
Published 2023-12-01Get full text
Article -
754
Android application privacy protection mechanism based on virtual machine bytecode injection
Published 2021-06-01Get full text
Article -
755
Improved SpaceTwist privacy protection method based on anchor optimization algorithm
Published 2017-10-01Get full text
Article -
756
Classification auditting scheme for privacy protection of outsourced EHR based on distributed storage
Published 2024-09-01Get full text
Article -
757
Online medical privacy protection strategy under information value-added mechanism
Published 2022-12-01Get full text
Article -
758
Supporting Collaborative Privacy-Observant Information Sharing Using RFID-Tagged Objects
Published 2009-01-01Get full text
Article -
759
CP-ABE based users collaborative privacy protection scheme for continuous query
Published 2017-09-01Get full text
Article -
760
k-means clustering method preserving differential privacy in MapReduce framework
Published 2016-02-01Get full text
Article