Suggested Topics within your search.
Suggested Topics within your search.
- Information technology 4
- Moral and ethical aspects 4
- Leadership 3
- Advertising 2
- Customer relations 2
- Customer services 2
- Economic policy 2
- Internet in public administration 2
- Law and legislation 2
- Legal ethics 2
- Online social networks 2
- Public administration 2
- Social media 2
- Aquatic plants 1
- Attitudes 1
- Authoritarianism 1
- Children 1
- Communication 1
- Consumers 1
- Criminal investigation 1
- Cultural policy 1
- Cultural property 1
- Curricula 1
- Curriculum evaluation 1
- Curriculum planning 1
- Data processing 1
- Delivery of Health Care 1
- Diversity in the workplace 1
- Economic Policy 1
- Economics 1
-
841
Privacy-preserving scheme for logistics systems based on 2D code and information hiding
Published 2017-11-01Get full text
Article -
842
Time-based and privacy protection revocable and traceable data sharing scheme in cloud computing
Published 2021-10-01Get full text
Article -
843
Prophet: A Context-Aware Location Privacy-Preserving Scheme in Location Sharing Service
Published 2017-01-01Get full text
Article -
844
Research on QR code logistics privacy based on segmented encryption and time-limited control
Published 2019-08-01Get full text
Article -
845
-
846
A synchronous compression and encryption method for massive electricity consumption data privacy preserving
Published 2025-01-01Get full text
Article -
847
South African Electoral Commission’s mobile app for voters: Data privacy and security dimensions
Published 2024-12-01Get full text
Article -
848
Enhancing privacy and traceability of public health insurance claim system using blockchain technology
Published 2025-02-01Get full text
Article -
849
Efficient privacy-preserving image retrieval scheme over outsourced data with multi-user
Published 2019-02-01Get full text
Article -
850
Privacy-preserving data compression scheme for k-anonymity model based on Huffman coding
Published 2023-08-01Get full text
Article -
851
Scalable and Privacy-Preserving Inter-AS Routing Through Machine-Learning-Based Graph Pruning
Published 2025-01-01Get full text
Article -
852
Privacy-preserving indoor localization scheme based on Wi-Fi fingerprint with outsourced computing
Published 2024-02-01Get full text
Article -
853
-
854
Preserving source-location privacy efficiently based on attack-perceiving in wireless sensor network
Published 2018-01-01Get full text
Article -
855
Lightweight privacy protection data auditing scheme for regenerating-coding-based distributed storage
Published 2021-07-01Get full text
Article -
856
Privacy-preserving real-time road conditions monitoring scheme based on intelligent traffic
Published 2020-07-01Get full text
Article -
857
Towards Privacy in Decentralized IoT: A Blockchain-Based Dual Response DP Mechanism
Published 2024-09-01Get full text
Article -
858
Fine-grained access control scheme with user privacy protection in cloud storage systems
Published 2014-11-01Get full text
Article -
859
RPRep: A Robust and Privacy-Preserving Reputation Management Scheme for Pseudonym-Enabled VANETs
Published 2016-03-01Get full text
Article -
860
Design of Updating Encryption Algorithm for Privacy Big Data Based on Consortium Blockchain Technology
Published 2022-01-01Get full text
Article