Journal articles on the topic 'Security of private data'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Security of private data.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Kapil, Gayatri, Alka Agrawal, and R. A. Khan. "Big Data Security and Privacy Issues." Asian Journal of Computer Science and Technology 7, no. 2 (August 5, 2018): 128–32. http://dx.doi.org/10.51983/ajcst-2018.7.2.1861.
Full textAlqadi, Ziad, and Mohammad S. Khrisat. "DATA STEGANOGRAPHY USING EMBEDDED PRIVATE KEY." International Journal of Engineering Technologies and Management Research 7, no. 9 (September 21, 2020): 31–38. http://dx.doi.org/10.29121/ijetmr.v7.i9.2020.782.
Full textHussain, Md Equebal, and Mohammad Rashid Hussain. "Securing Cloud Data using RSA Algorithm." International Journal of Recent Contributions from Engineering, Science & IT (iJES) 6, no. 4 (December 19, 2018): 96. http://dx.doi.org/10.3991/ijes.v6i4.9910.
Full textSrinivasu, N., Masood Sahil, Jeevan Francis, and Sure Pravallika. "Security enhanced using honey encryption for private data sharing in cloud." International Journal of Engineering & Technology 7, no. 1.1 (December 21, 2017): 675. http://dx.doi.org/10.14419/ijet.v7i1.1.10826.
Full textGatkal, Suyog, Vinayak Dhage, Dhanashree Kalekar, and Sanket Ghadge. "Survey on Medical Data Storage Systems." International Journal of Soft Computing and Engineering 11, no. 1 (September 30, 2021): 44–48. http://dx.doi.org/10.35940/ijsce.a3528.0911121.
Full textDeb, Nabamita, Mohamed A. Elashiri, T. Veeramakali, Abdul Wahab Rahmani, and Sheshang Degadwala. "A Metaheuristic Approach for Encrypting Blockchain Data Attributes Using Ciphertext Policy Technique." Mathematical Problems in Engineering 2022 (February 10, 2022): 1–10. http://dx.doi.org/10.1155/2022/7579961.
Full textAvant, Deborah, and Kara Kingma Neu. "The Private Security Events Database." Journal of Conflict Resolution 63, no. 8 (January 30, 2019): 1986–2006. http://dx.doi.org/10.1177/0022002718824394.
Full textCoutu, Sylvain, Inbal Becker-Reshef, Alyssa K. Whitcraft, and Chris Justice. "Food security: underpin with public and private data sharing." Nature 578, no. 7796 (February 2020): 515. http://dx.doi.org/10.1038/d41586-020-00241-y.
Full textHennessy, S. D., G. D. Lauer, N. Zunic, B. Gerber, and A. C. Nelson. "Data-centric security: Integrating data privacy and data security." IBM Journal of Research and Development 53, no. 2 (March 2009): 2:1–2:12. http://dx.doi.org/10.1147/jrd.2009.5429044.
Full textPark, Young-Hoon, Yejin Kim, and Junho Shim. "Blockchain-Based Privacy-Preserving System for Genomic Data Management Using Local Differential Privacy." Electronics 10, no. 23 (December 3, 2021): 3019. http://dx.doi.org/10.3390/electronics10233019.
Full textAgarwal, Archita, Maurice Herlihy, Seny Kamara, and Tarik Moataz. "Encrypted Databases for Differential Privacy." Proceedings on Privacy Enhancing Technologies 2019, no. 3 (July 1, 2019): 170–90. http://dx.doi.org/10.2478/popets-2019-0042.
Full textSood, Sandeep K. "Hybrid Data Security Model for Cloud." International Journal of Cloud Applications and Computing 3, no. 3 (July 2013): 50–59. http://dx.doi.org/10.4018/ijcac.2013070104.
Full textCarrillo, Eduardo, and Maricarmen Sequera. "PERSONAL DATA IN THE SOCIAL SECURITY INSTITUTE." Law, State and Telecommunications Review 12, no. 2 (October 13, 2020): 14–37. http://dx.doi.org/10.26512/lstr.v12i2.34689.
Full textTian, Jun-Feng, and Hao-Ning Wang. "An efficient and secure data auditing scheme based on fog-to-cloud computing for Internet of things scenarios." International Journal of Distributed Sensor Networks 16, no. 5 (May 2020): 155014772091662. http://dx.doi.org/10.1177/1550147720916623.
Full textBeardsley, Bob. "Private Security: Enigma and Overlooked Resource." Journal of Contemporary Criminal Justice 3, no. 4 (December 1987): 44–51. http://dx.doi.org/10.1177/104398628700300404.
Full textYovine, Sergio, Franz Mayr, Sebastián Sosa, and Ramiro Visca. "An Assessment of the Application of Private Aggregation of Ensemble Models to Sensible Data." Machine Learning and Knowledge Extraction 3, no. 4 (September 25, 2021): 788–801. http://dx.doi.org/10.3390/make3040039.
Full textC P, SHANTALA, and K. V. Viswanatha. "Secure SDN Framework for Data Exfiltration via Video Steganography." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 14, no. 9 (June 22, 2015): 6067–73. http://dx.doi.org/10.24297/ijct.v14i9.1847.
Full textGuo, Hong Liang, and He Long Yu. "Position Mobil Information Encryption Algorithm Based on Key Attributes of Reduced Rank Agent under Cloud Storage." Advanced Materials Research 989-994 (July 2014): 2008–11. http://dx.doi.org/10.4028/www.scientific.net/amr.989-994.2008.
Full textSatya Sai Kumar, Avula, S. Mohan, and R. Arunkumar. "A Survey on Security Models for Data Privacy in Big Data Analytics." Asian Journal of Computer Science and Technology 7, S1 (November 5, 2018): 87–89. http://dx.doi.org/10.51983/ajcst-2018.7.s1.1798.
Full textAbd, Mohammad Hasan. "Dynamic Data Replication for Higher Availability and Security." Wasit Journal of Computer and Mathematics Science 1, no. 1 (March 17, 2021): 31–42. http://dx.doi.org/10.31185/wjcm.vol1.iss1.6.
Full textKaraçay, Leyli, Erkay Savaş, and Halit Alptekin. "Intrusion Detection Over Encrypted Network Data." Computer Journal 63, no. 4 (November 17, 2019): 604–19. http://dx.doi.org/10.1093/comjnl/bxz111.
Full textShen, Qingni, Yahui Yang, Zhonghai Wu, Dandan Wang, and Min Long. "Securing data services: a security architecture design for private storage cloud based on HDFS." International Journal of Grid and Utility Computing 4, no. 4 (2013): 242. http://dx.doi.org/10.1504/ijguc.2013.057118.
Full textKasthuri, Magesh. "Blockchain based Data Security as a Service in Cloud Platform Security." International Journal on Cloud Computing: Services and Architecture 11, no. 6 (December 31, 2021): 1–8. http://dx.doi.org/10.5121/ijccsa.2021.11601.
Full textSun, Jianglin, Xiaofeng Liao, Xin Chen, and Shangwei Guo. "Privacy-Aware Image Encryption Based on Logistic Map and Data Hiding." International Journal of Bifurcation and Chaos 27, no. 05 (May 2017): 1750073. http://dx.doi.org/10.1142/s0218127417500730.
Full textKasza, Péter, Péter Ligeti, and Ádám Nagy. "Siren: Secure data sharing over P2P and F2F networks." Studia Scientiarum Mathematicarum Hungarica 52, no. 2 (June 2015): 257–64. http://dx.doi.org/10.1556/012.2015.52.2.1316.
Full textJawdhari, Hayder A., and Alharith A. Abdullah. "A New Environment of Blockchain based Multi Encryption Data Transferring." Webology 18, no. 2 (December 30, 2021): 1379–91. http://dx.doi.org/10.14704/web/v18i2/web18396.
Full textR. Sneberger, Michael. "Reconciling Competing Data Security Standards Applicable to Data Held by Retail Banks Operating in California in Light of Van Buren and TransUnion." Global Privacy Law Review 2, Issue 3 (October 1, 2021): 174–85. http://dx.doi.org/10.54648/gplr2021023.
Full textRath, Annanda, Bojan Spasic, Nick Boucart, and Philippe Thiran. "Security Pattern for Cloud SaaS: From System and Data Security to Privacy Case Study in AWS and Azure." Computers 8, no. 2 (May 3, 2019): 34. http://dx.doi.org/10.3390/computers8020034.
Full textYakhtin, Vasily. "National Information Risks of Big Data." Vestnik Volgogradskogo gosudarstvennogo universiteta. Ekonomika, no. 3 (November 2021): 16–25. http://dx.doi.org/10.15688/ek.jvolsu.2021.3.2.
Full textCorones, Stephen, and Juliet Davis. "Protecting Consumer Privacy and Data Security: Regulatory Challenges and Potential Future Directions." Federal Law Review 45, no. 1 (March 2017): 65–95. http://dx.doi.org/10.1177/0067205x1704500104.
Full textFroelicher, David, Patricia Egger, João Sá Sousa, Jean Louis Raisaro, Zhicong Huang, Christian Mouchet, Bryan Ford, and Jean-Pierre Hubaux. "UnLynx: A Decentralized System for Privacy-Conscious Data Sharing." Proceedings on Privacy Enhancing Technologies 2017, no. 4 (October 1, 2017): 232–50. http://dx.doi.org/10.1515/popets-2017-0047.
Full textMaryanto, Maryanto, Maisyaroh Maisyaroh, and Budi Santoso. "Metode Internet Protocol Security (IPSec) Dengan Virtual Private Network (VPN) Untuk Komunikasi Data." PIKSEL : Penelitian Ilmu Komputer Sistem Embedded and Logic 6, no. 2 (September 18, 2018): 179–88. http://dx.doi.org/10.33558/piksel.v6i2.1508.
Full textBenmalek, Mourad, Mohamed Ali Benrekia, and Yacine Challal. "Security of Federated Learning: Attacks, Defensive Mechanisms, and Challenges." Revue d'Intelligence Artificielle 36, no. 1 (February 28, 2022): 49–59. http://dx.doi.org/10.18280/ria.360106.
Full textSuleiman, James, and Terry Huston. "Data Privacy and Security." International Journal of Information Security and Privacy 3, no. 2 (April 2009): 42–53. http://dx.doi.org/10.4018/jisp.2009040103.
Full textGaff, Brian M., Thomas J. Smedinghoff, and Socheth Sor. "Privacy and Data Security." Computer 45, no. 3 (March 2012): 8–10. http://dx.doi.org/10.1109/mc.2012.102.
Full textAdam, J. A. "Data security-cryptography=privacy?" IEEE Spectrum 29, no. 8 (August 1992): 29–35. http://dx.doi.org/10.1109/6.144533.
Full textHuang, Qinlong, Licheng Wang, and Yixian Yang. "Secure and Privacy-Preserving Data Sharing and Collaboration in Mobile Healthcare Social Networks of Smart Cities." Security and Communication Networks 2017 (2017): 1–12. http://dx.doi.org/10.1155/2017/6426495.
Full textEL Azzaoui, Abir, Haotian Chen, So Hyeon Kim, Yi Pan, and Jong Hyuk Park. "Blockchain-Based Distributed Information Hiding Framework for Data Privacy Preserving in Medical Supply Chain Systems." Sensors 22, no. 4 (February 10, 2022): 1371. http://dx.doi.org/10.3390/s22041371.
Full textSingh, Ajit, and Rimple Gilhotra. "Data Security Using Private Key Encryption System Based on Arithmetic Coding." International Journal of Network Security & Its Applications 3, no. 3 (May 31, 2011): 58–67. http://dx.doi.org/10.5121/ijnsa.2011.3305.
Full textWang, Huiyong, Mingjun Luo, and Yong Ding. "Privacy-Preserving Fingerprint Authentication Using D-H Key Exchange and Secret Sharing." Security and Communication Networks 2021 (November 27, 2021): 1–12. http://dx.doi.org/10.1155/2021/5344696.
Full textGeorge, Jomin, and Takura Bhila. "Security, Confidentiality and Privacy in Health of Healthcare Data." International Journal of Trend in Scientific Research and Development Volume-3, Issue-4 (June 30, 2019): 373–77. http://dx.doi.org/10.31142/ijtsrd23780.
Full textKumar.R, Dr Prasanna, Porselvan G, Prem Kumar S, and Robinlash F. "Security and Privacy Based Data Sharing in Cloud Computing." International Journal of Innovative Research in Engineering & Management 5, no. 1 (January 2018): 42–49. http://dx.doi.org/10.21276/ijirem.2018.5.1.9.
Full textV, Suma. "SECURITY AND PRIVACY MECHANISM USING BLOCKCHAIN." Journal of Ubiquitous Computing and Communication Technologies 01, no. 01 (September 23, 2019): 45–54. http://dx.doi.org/10.36548/jucct.2019.1.005.
Full textZeng, Wen Ying, and Yue Long Zhao. "Mobile Storage and Data Security Management Research." Applied Mechanics and Materials 325-326 (June 2013): 1661–64. http://dx.doi.org/10.4028/www.scientific.net/amm.325-326.1661.
Full textHelmiawan, Muhammad Agreindra, and Irfan Fadil. "PRIVATE CLOUD STORAGE IN RURAL'S MANAGEMENT AND INFORMATION SYSTEM USING ROADMAP FOR CLOUD COMPUTING ADOPTION (ROCCA)." INTERNAL (Information System Journal) 2, no. 2 (January 30, 2020): 172–83. http://dx.doi.org/10.32627/internal.v2i2.85.
Full textHaughton, Suzette A., Trevor A. Smith, and Joakim Berndtsson. "Consumer Drivers of Industry Growth and Household Loyalty to Private Security Firms in Jamaica." Journal of Contemporary Criminal Justice 36, no. 1 (December 4, 2019): 110–27. http://dx.doi.org/10.1177/1043986219890204.
Full textDiers-Lawson, Audra, and Amelia Symons. "Mind the gap: Understanding stakeholder reactions to different types of data security." Proceedings of the International Crisis and Risk Communication Conference 3 (March 11, 2020): 25–28. http://dx.doi.org/10.30658/icrcc.2020.6.
Full textNoh, Geontae, Ji Young Chun, and Ik Rae Jeong. "Sharing Privacy Protected and Statistically Sound Clinical Research Data Using Outsourced Data Storage." Journal of Applied Mathematics 2014 (2014): 1–12. http://dx.doi.org/10.1155/2014/381361.
Full textLi, Ye, Zoe L. Jiang, Xuan Wang, Junbin Fang, En Zhang, and Xianmin Wang. "Securely Outsourcing ID3 Decision Tree in Cloud Computing." Wireless Communications and Mobile Computing 2018 (October 4, 2018): 1–10. http://dx.doi.org/10.1155/2018/2385150.
Full textPelau, Corina, Mihaela Stanescu, and Daniela Serban. "Big-Data and Consumer Profiles – The hidden traps of data collection on social media networks." Proceedings of the International Conference on Business Excellence 13, no. 1 (May 1, 2019): 1070–78. http://dx.doi.org/10.2478/picbe-2019-0093.
Full text