Academic literature on the topic 'Primary User Privacy'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Primary User Privacy.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Primary User Privacy"
Clark, Matthew, and Konstantinos Psounis. "Optimizing Primary User Privacy in Spectrum Sharing Systems." IEEE/ACM Transactions on Networking 28, no. 2 (April 2020): 533–46. http://dx.doi.org/10.1109/tnet.2020.2967776.
Full textJagwani, Priti, and Saroj Kaushik. "Entropy-Based Quantification of Privacy Attained Through User Profile Similarity." International Journal of Information Security and Privacy 15, no. 3 (July 2021): 19–32. http://dx.doi.org/10.4018/ijisp.2021070102.
Full textUllah, Mohib, Muhammad Arshad Islam, Rafiullah Khan, Muhammad Aleem, and Muhammad Azhar Iqbal. "ObSecure Logging (OSLo): A Framework to Protect and Evaluate the Web Search Privacy in Health Care Domain." Journal of Medical Imaging and Health Informatics 9, no. 6 (August 1, 2019): 1181–90. http://dx.doi.org/10.1166/jmihi.2019.2708.
Full textJaiswal, Mimansa, and Emily Mower Provost. "Privacy Enhanced Multimodal Neural Representations for Emotion Recognition." Proceedings of the AAAI Conference on Artificial Intelligence 34, no. 05 (April 3, 2020): 7985–93. http://dx.doi.org/10.1609/aaai.v34i05.6307.
Full textAlMarzooqi, Fatima Mohamed, Immanuel Azaad Moonesar, and Raeda AlQutob. "Healthcare Professional and User Perceptions of eHealth Data and Record Privacy in Dubai." Information 11, no. 9 (August 28, 2020): 415. http://dx.doi.org/10.3390/info11090415.
Full textS. Jahromi, Mohammad N., Pau Buch-Cardona, Egils Avots, Kamal Nasrollahi, Sergio Escalera, Thomas B. Moeslund, and Gholamreza Anbarjafari. "Privacy-Constrained Biometric System for Non-Cooperative Users." Entropy 21, no. 11 (October 24, 2019): 1033. http://dx.doi.org/10.3390/e21111033.
Full textGhosh, Isha, and Vivek Singh. "Phones, privacy, and predictions." Online Information Review 44, no. 2 (October 23, 2018): 483–502. http://dx.doi.org/10.1108/oir-03-2018-0112.
Full textDeni Ardiansyah and Lies Handrijaningsih. "The Impact Of E-Service Quality To Wards Customre Satisfaction On The User Of Internet Banking In PT. Bank Rakyat Indonesia Tbk (Persero)." International Journal of Science, Technology & Management 2, no. 4 (July 25, 2021): 1415–22. http://dx.doi.org/10.46729/ijstm.v2i4.254.
Full textCohn, Ellen R., and Jana Cason. "Editors' Note." International Journal of Telerehabilitation 9, no. 1 (June 29, 2017): 1–2. http://dx.doi.org/10.5195/ijt.2017.6221.
Full textSharma, Dhruti P., and Devesh C. Jinwala. "Aggregate Searchable Encryption With Result Privacy." International Journal of Information Security and Privacy 14, no. 2 (April 2020): 62–82. http://dx.doi.org/10.4018/ijisp.2020040104.
Full textDissertations / Theses on the topic "Primary User Privacy"
Makin, Cameron. "Primary User Obfuscation in an Incumbent Informed Spectrum Access System." Thesis, Virginia Tech, 2021. http://hdl.handle.net/10919/104015.
Full textMaster of Science
With a growing demand for spectrum availability, wireless spectrum sharing has become a high-profile solution to spectrum overcrowding. In order to enable spectrum sharing between incumbent/primary (e.g.,federal communications, naval radar, users already grandfathered into the band) and secondary users (e.g., commercial communications companies), incumbents must have spectrum protection and privacy from malicious new entrants. In this Spectrum Access System (SAS) advancement, Primary Users (PUs) are obfuscated with the efforts of the incumbent informed SAS and the cooperation of obedient new entrants. Further, the necessary changes to the SAS to support this privacy scheme are exposed to suggest improvements in PU privacy, Citizens Broadband Radio Service Device (CBSD)-SAS relations, and punishment for unauthorized transmission. Results show the feasibility of PU obfuscation with respect to malicious spectrum sensing users. Simulation results indicate that the obfuscation tactic can deliver location and frequency occupation privacy with 75% and 66% effectiveness respectively in a 100% efficient spectrum utilization oriented obfuscation scheme. A scheme without spectrum utilization constraint shows up to 91% location privacy effectiveness. Experiment trials indicate that the privacy tactic can be implemented on an open-source SAS, however environmental factors may degrade the tactic's performance.
张弦 and Xian Zhang. "Explaining public-private partnerships in China: case study of primary land development in Beijing." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2011. http://hub.hku.hk/bib/B47849368.
Full textpublished_or_final_version
Politics and Public Administration
Doctoral
Doctor of Philosophy
Khemsiri, Praphamontripong Heyl Barbara Sherman Padavil George. "Leadership styles used in team building by administrators from accredited private primary schools in Bangkok." Normal, Ill. Illinois State University, 2002. http://wwwlib.umi.com/cr/ilstu/fullcit?p3088030.
Full textTitle from title page screen, viewed January 3, 2006. Dissertation Committee: Barbara Heyl, George Padavil (co-chairs), Linda Lyman, Paul Baker. Includes bibliographical references (leaves 208-215) and abstract. Also available in print.
Books on the topic "Primary User Privacy"
Salleh, Dani, and Mazlan Ismail. Infrastructure procurement framework for local authority. UUM Press, 2015. http://dx.doi.org/10.32890/9789670474434.
Full textPaul, Torremans. Part VI The Law of Property, 33 Corporations. Oxford University Press, 2017. http://dx.doi.org/10.1093/law/9780199678983.003.0033.
Full textRandhawa, Gurvaneet S., and Edwin A. Lomotan. Harnessing Big Data-Based Technologies to Improve Cancer Care. Edited by David A. Chambers, Wynne E. Norton, and Cynthia A. Vinson. Oxford University Press, 2018. http://dx.doi.org/10.1093/med/9780190647421.003.0034.
Full textKearney, Joseph D., and Thomas W. Merrill. Lakefront. Cornell University Press, 2021. http://dx.doi.org/10.7591/cornell/9781501754654.001.0001.
Full textOlsen, Jan Abel. Funding sources: an overview. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198794837.003.0009.
Full textFisher, Talia. Law and Economics of Alternative Dispute Resolution. Edited by Francesco Parisi. Oxford University Press, 2017. http://dx.doi.org/10.1093/oxfordhb/9780199684250.013.008.
Full textAdsul, Prajakta, and Purnima Madhivanan. Assessing the Community Context When Implementing Cervical Cancer Screening Programs. Edited by David A. Chambers, Wynne E. Norton, and Cynthia A. Vinson. Oxford University Press, 2018. http://dx.doi.org/10.1093/med/9780190647421.003.0032.
Full textDabhoiwala, Faramerz. Writing Petitions in Early Modern England. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198748267.003.0007.
Full textRomanowski, Nick. Wetland Habitats. CSIRO Publishing, 2010. http://dx.doi.org/10.1071/9780643100220.
Full textTrill, Suzanne. Lay Households. Edited by Andrew Hiscock and Helen Wilcox. Oxford University Press, 2017. http://dx.doi.org/10.1093/oxfordhb/9780199672806.013.24.
Full textBook chapters on the topic "Primary User Privacy"
Çelik, Sabri. "The Conflict Management Styles Used by Managers of Private Primary Schools: An Example of Ankara." In Chaos, Complexity and Leadership 2013, 315–26. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-09710-7_28.
Full textSzewczak, Edward J. "Personal Information Privacy and Internet Technology." In Encyclopedia of Information Science and Technology, First Edition, 2272–76. IGI Global, 2005. http://dx.doi.org/10.4018/978-1-59140-553-5.ch400.
Full textWarkentin, Merrill, Kimberly Davis, and Ernst Bekkering. "Introducing the Check-Off Password System (COPS)." In End-User Computing, 81–97. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-945-8.ch009.
Full textGrandison, Tyrone, Pei-yun S. Hsueh, Liangzhao Zeng, Henry Chang, Yi-Hui Chen, Ci-Wei Lan, Hao-Ting (Howard) Pai, and Li-Feng Tseng. "Privacy Protection Issues for Healthcare Wellness Clouds." In Privacy Protection Measures and Technologies in Business Organizations, 227–44. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-61350-501-4.ch009.
Full textSharma, Dhruti P., and Devesh C. Jinwala. "Aggregate Searchable Encryption With Result Privacy." In Research Anthology on Artificial Intelligence Applications in Security, 922–45. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-7705-9.ch043.
Full textSharma, Dhruti P., and Devesh C. Jinwala. "Aggregate Searchable Encryption With Result Privacy." In Research Anthology on Artificial Intelligence Applications in Security, 922–45. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-7705-9.ch043.
Full textReddy, Keesara Sravanthi. "Blockchain-Enabled Decentralization Service for Automated Parking Systems." In Advances in Data Mining and Database Management, 51–63. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-3295-9.ch004.
Full textWarkentin, Merrill, Kimberly Davis, and Ernst Bekkering. "A TAM Analysis of an Alternative High-Security User Authentication Procedure." In Advances in End User Computing, 280–300. IGI Global, 2005. http://dx.doi.org/10.4018/978-1-59140-474-3.ch014.
Full textKakaletris, George, Dimitris Varoutas, Dimitris Katsianis, and Thomas Sphicopoulos. "Design and Implementation Approaches for Location-Based, Tourism-Related Services." In Geographic Information Systems, 258–94. IGI Global, 2013. http://dx.doi.org/10.4018/978-1-4666-2038-4.ch018.
Full textKakaletris, George, Dimitris Varoutas, Dimitris Katsianis, and Thomas Sphicopoulos. "Design and Implementation Approaches for Location-Based, Tourism-Related Services." In Information Communication Technologies, 951–87. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-949-6.ch065.
Full textConference papers on the topic "Primary User Privacy"
Rosenthal, Paul, and L. Jane Park. "Managing Information Systems Textbooks: Assessing their Orientation toward Potential General Managers." In InSITE 2009: Informing Science + IT Education Conference. Informing Science Institute, 2009. http://dx.doi.org/10.28945/3314.
Full textBahrak, Behnam, Sudeep Bhattarai, Abid Ullah, Jung-Min Jerry Park, Jeffery Reed, and David Gurney. "Protecting the primary users' operational privacy in spectrum sharing." In 2014 IEEE International Symposium on Dynamic Spectrum Access Networks (DySPAN). IEEE, 2014. http://dx.doi.org/10.1109/dyspan.2014.6817800.
Full textWang, Jingyi, Yanmin Gong, Lijun Qian, Riku Jaentti, Miao Pan, and Zhu Han. "Primary Users' Operational Privacy Preservation via Data-Driven Optimization." In 2017 IEEE Global Communications Conference (GLOBECOM 2017). IEEE, 2017. http://dx.doi.org/10.1109/glocom.2017.8254108.
Full textLiu, Yao, Peng Ning, and Huaiyu Dai. "Authenticating Primary Users' Signals in Cognitive Radio Networks via Integrated Cryptographic and Wireless Link Signatures." In 2010 IEEE Symposium on Security and Privacy. IEEE, 2010. http://dx.doi.org/10.1109/sp.2010.24.
Full textLiu, Jianqing, Chi Zhang, Haichuan Ding, Hao Yue, and Yuguang Fang. "Policy-Based Privacy-Preserving Scheme for Primary Users in Database-Driven Cognitive Radio Networks." In GLOBECOM 2016 - 2016 IEEE Global Communications Conference. IEEE, 2016. http://dx.doi.org/10.1109/glocom.2016.7842151.
Full textBrijaková, Annamária. "Information and digital literacy of teachers in Slovakia an their adaptation on homeschooling." In Agria Média 2020 : „Az oktatás digitális átállása korunk pedagógiai forradalma”. Eszterházy Károly Egyetem Líceum Kiadó, 2021. http://dx.doi.org/10.17048/am.2020.69.
Full textBonasif, Jorge. "Urban Transportation Conditions from the Metropolitan Area of Kuala Lumpur that will Impact and Endanger Putrajaya’s Sustainability Plan." In Environmental Engineering. VGTU Technika, 2017. http://dx.doi.org/10.3846/enviro.2017.101.
Full textSlusareva, Elena, and Maria Plugina. "Psychological Characteristics of Inclusive Educational Environments." In The Public/Private in Modern Civilization, the 22nd Russian Scientific-Practical Conference (with international participation) (Yekaterinburg, April 16-17, 2020). Liberal Arts University – University for Humanities, Yekaterinburg, 2020. http://dx.doi.org/10.35853/ufh-public/private-2020-45.
Full textBarcelos Jorge da Silveira, Victoria, Diego Moreira Souza, and Fabrício Peixoto Alvarenga. "Urban Landscape in the Historic Center of Campos dos Goytacazes:the effect of oil royalties on the use of public and private spaces between 1996 and 2020." In 7th International Congress on Scientific Knowledge. Perspectivas Online: Humanas e Sociais Aplicadas, 2021. http://dx.doi.org/10.25242/8876113220212431.
Full textRiis, Dan. "Developing Non-Gasoline Burning Outboard Motors for the UK MoD." In ASME 2005 Internal Combustion Engine Division Fall Technical Conference. ASMEDC, 2005. http://dx.doi.org/10.1115/icef2005-1223.
Full textReports on the topic "Primary User Privacy"
Punjabi, Maitri, Julianne Norman, Lauren Edwards, and Peter Muyingo. Using ACASI to Measure Gender-Based Violence in Ugandan Primary Schools. RTI Press, March 2021. http://dx.doi.org/10.3768/rtipress.2021.rb.0025.2104.
Full textSchnabel, Filipina, and Danielle Aldridge. Effectiveness of EHR-Depression Screening Among Adult Diabetics in an Urban Primary Care Clinic. University of Tennessee Health Science Center, April 2021. http://dx.doi.org/10.21007/con.dnp.2021.0003.
Full textBaloch, Imdad, and Abeba Taddese. EdTech in Pakistan: A Rapid Scan. EdTech Hub, June 2020. http://dx.doi.org/10.53832/edtechhub.0035.
Full textKhalayleh, A., and A. Taddese. EdTech in Jordan: A Rapid Scan. EdTech Hub, June 2020. http://dx.doi.org/10.53832/edtechhub.0031.
Full textTaddese, A. EdTech in Ghana: A Rapid Scan. EdTech Hub, June 2020. http://dx.doi.org/10.53832/edtechhub.0030.
Full textUpadhyay, Arjun, and Abeba Taddese. EdTech in Senegal: A Rapid Scan. EdTech Hub, January 2020. http://dx.doi.org/10.53832/edtechhub.0037.
Full textMullan, Joel, and Abeba Taddese. EdTech in Sierra Leone: A Rapid Scan. EdTech Hub, June 2020. http://dx.doi.org/10.53832/edtechhub.0038.
Full textUpadhyay, Arjun, and Abeba Taddese. EdTech in Liberia: A Rapid Scan. EdTech Hub, January 2020. http://dx.doi.org/10.53832/edtechhub.0033.
Full textOtieno, J., and A. Taddese. EdTech in Kenya: A Rapid Scan. EdTech Hub, June 2020. http://dx.doi.org/10.53832/edtechhub.0032.
Full textKimenyi, Eric, Rachel Chuang, and Abeba Taddese. EdTech in Rwanda: A Rapid Scan. EdTech Hub, June 2020. http://dx.doi.org/10.53832/edtechhub.0036.
Full text