Journal articles on the topic 'Spectrum Access System Privacy'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Spectrum Access System Privacy.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Clark, Matthew A., and Konstantinos Psounis. "Trading Utility for Privacy in Shared Spectrum Access Systems." IEEE/ACM Transactions on Networking 26, no. 1 (February 2018): 259–73. http://dx.doi.org/10.1109/tnet.2017.2778260.
Full textZhang, Mengyuan, Jiming Chen, Shibo He, Lei Yang, Xiaowen Gong, and Junshan Zhang. "Privacy-Preserving Database Assisted Spectrum Access for Industrial Internet of Things: A Distributed Learning Approach." IEEE Transactions on Industrial Electronics 67, no. 8 (August 2020): 7094–103. http://dx.doi.org/10.1109/tie.2019.2938491.
Full textAhmed, Iqrar, Heikki Karvonen, Timo Kumpuniemi, and Marcos Katz. "Wireless Communications for the Hospital of the Future: Requirements, Challenges and Solutions." International Journal of Wireless Information Networks 27, no. 1 (October 28, 2019): 4–17. http://dx.doi.org/10.1007/s10776-019-00468-1.
Full textSun, Guiling, Weijian Zhao, Ruobin Wang, and Xuanjie Li. "Design of Ethernet-VLC Data Conversion System Based on FPGA." International Journal of Computer Theory and Engineering 12, no. 3 (2020): 69–73. http://dx.doi.org/10.7763/ijcte.2020.v12.1266.
Full textVorakulpipat, Chalee, Soontorn Sirapaisan, Ekkachan Rattanalerdnusorn, and Visut Savangsuk. "A Policy-Based Framework for Preserving Confidentiality in BYOD Environments: A Review of Information Security Perspectives." Security and Communication Networks 2017 (2017): 1–11. http://dx.doi.org/10.1155/2017/2057260.
Full textZong Chen, Joy Iong, and Kong-Long Lai. "Internet of Things (IoT) Authentication and Access Control by Hybrid Deep Learning Method - A Study." December 2020 2, no. 4 (January 19, 2021): 236–45. http://dx.doi.org/10.36548/jscp.2020.4.005.
Full textMitrea, Teodor, Vlad Vasile, and Monica Borda. "Mobile Applications - (in) Security Overview." International conference KNOWLEDGE-BASED ORGANIZATION 25, no. 3 (June 1, 2019): 42–45. http://dx.doi.org/10.2478/kbo-2019-0115.
Full textSzydłowski, Dariusz, and Kamil Martyniak. "Contemporary threats related to content processing in the cyberspace." ASEJ Scientific Journal of Bielsko-Biala School of Finance and Law 23, no. 1 (April 30, 2019): 13–17. http://dx.doi.org/10.5604/01.3001.0013.1759.
Full textPetrenko, Christie LM, Jennifer Parr, Carson Kautz, Cristiano Tapparello, and Heather Carmichael Olson. "A Mobile Health Intervention for Fetal Alcohol Spectrum Disorders (Families Moving Forward Connect): Development and Qualitative Evaluation of Design and Functionalities." JMIR mHealth and uHealth 8, no. 4 (April 6, 2020): e14721. http://dx.doi.org/10.2196/14721.
Full textGwynette, McLeod Frampton, Danielle Morriss, Nancy Warren, James Truelove, Jennifer Warthen, Charles Paul Ross, George Mood, Charlotte Anne Snook, and Jeffrey Borckardt. "Social Skills Training for Adolescents With Autism Spectrum Disorder Using Facebook (Project Rex Connect): A Survey Study." JMIR Mental Health 4, no. 1 (January 23, 2017): e4. http://dx.doi.org/10.2196/mental.6605.
Full textKrim, Mohamed, Adda Ali-Pacha, and Naima Hadj-Said. "New Binary Code Combined with New Chaotic Map and Gold Code to Ameliorate the Quality of the Transmission." Indonesian Journal of Electrical Engineering and Computer Science 5, no. 1 (January 1, 2017): 166. http://dx.doi.org/10.11591/ijeecs.v5.i1.pp166-180.
Full textChivilgina, Olga, Tenzin Wangmo, Bernice Simone Elger, Thomas Heinrich, and Fabrice Jotterand. "mHealth for schizophrenia spectrum disorders management: A systematic review." International Journal of Social Psychiatry 66, no. 7 (June 23, 2020): 642–65. http://dx.doi.org/10.1177/0020764020933287.
Full textHashim, Norlezah, Fakrulradzi Idris, Tuan Nur Anisa Tuan Ab Aziz, Siti Halma Johari, Rozilawati Mohd Nor, and Norfariza Ab Wahab. "Location tracking using LoRa." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 4 (August 1, 2021): 3123. http://dx.doi.org/10.11591/ijece.v11i4.pp3123-3128.
Full textArdagna, C. A., M. Cremonini, S. De Capitani di Vimercati, and P. Samarati. "A privacy-aware access control system." Journal of Computer Security 16, no. 4 (July 16, 2008): 369–97. http://dx.doi.org/10.3233/jcs-2008-0328.
Full textShafeeq, Sehrish, Masoom Alam, and Abid Khan. "Privacy aware decentralized access control system." Future Generation Computer Systems 101 (December 2019): 420–33. http://dx.doi.org/10.1016/j.future.2019.06.025.
Full textSalama, Ahmed M., Ming Li, Loukas Lazos, Yong Xiao, and Marwan Krunz. "Trading Privacy for Utility in Database-Assisted Dynamic Spectrum Access." IEEE Transactions on Cognitive Communications and Networking 5, no. 3 (September 2019): 611–24. http://dx.doi.org/10.1109/tccn.2019.2919731.
Full textLi, Xiaohui, Qi Zhu, and Xianbin Wang. "Privacy-Aware Crowdsourced Spectrum Sensing and Multi-User Sharing Mechanism in Dynamic Spectrum Access Networks." IEEE Access 7 (2019): 32971–88. http://dx.doi.org/10.1109/access.2019.2901200.
Full textWang, Xiaoyan, Masahiro Umehira, Biao Han, Hao Zhou, Peng Li, and Celimuge Wu. "An Efficient Privacy Preserving Spectrum Sharing Framework for Internet of Things." IEEE Access 8 (2020): 34675–85. http://dx.doi.org/10.1109/access.2020.2974227.
Full textLai, Huibin, Li Xu, and Yali Zeng. "An Efficient Location Privacy-Preserving Authentication Scheme for Cooperative Spectrum Sensing." IEEE Access 8 (2020): 163472–82. http://dx.doi.org/10.1109/access.2020.3021583.
Full textTroja, Erald, Nikhil Yadav, Ice Lin, and Nhie U. Diep. "Privacy-Preserving Crowd-Sensing for Dynamic Spectrum Access With Malicious Workers." IEEE Access 9 (2021): 24234–48. http://dx.doi.org/10.1109/access.2021.3057322.
Full textNaher, Nahitun, Dina Balabanova, Eleanor Hutchinson, Robert Marten, Roksana Hoque, Samiun Nazrin Bente Kamal Tune, Bushra Zarin Islam, and Syed Masud Ahmed. "Do social accountability approaches work? A review of the literature from selected low- and middle-income countries in the WHO South-East Asia region." Health Policy and Planning 35, Supplement_1 (November 1, 2020): i76—i96. http://dx.doi.org/10.1093/heapol/czaa107.
Full textChavhan, Suresh, Deepak Gupta, Sahil Garg, Ashish Khanna, Bong Jun Choi, and M. Shamim Hossain. "Privacy and Security Management in Intelligent Transportation System." IEEE Access 8 (2020): 148677–88. http://dx.doi.org/10.1109/access.2020.3015096.
Full textYao, Jing, Yifeng Zheng, Yu Guo, Chengjun Cai, Anxin Zhou, Cong Wang, and Xiaolin Gui. "A Privacy-Preserving System for Targeted Coupon Service." IEEE Access 7 (2019): 120817–30. http://dx.doi.org/10.1109/access.2019.2937669.
Full textMing, Yang, and Tingting Zhang. "Efficient Privacy-Preserving Access Control Scheme in Electronic Health Records System." Sensors 18, no. 10 (October 18, 2018): 3520. http://dx.doi.org/10.3390/s18103520.
Full textAbd Razak, Shukor, Nur Hafizah Mohd Nazari, and Arafat Al-Dhaqm. "Data Anonymization Using Pseudonym System to Preserve Data Privacy." IEEE Access 8 (2020): 43256–64. http://dx.doi.org/10.1109/access.2020.2977117.
Full textZhu, Yong, Chao Huang, Zhihui Hu, Abdullah Al-Dhelaan, and Mohammed Al-Dhelaan. "Blockchain-Enabled Access Management System for Edge Computing." Electronics 10, no. 9 (April 22, 2021): 1000. http://dx.doi.org/10.3390/electronics10091000.
Full textZhou, Xingguang, Jianwei Liu, Zongyang Zhang, and Qianhong Wu. "Secure Outsourced Medical Data against Unexpected Leakage with Flexible Access Control in a Cloud Storage System." Security and Communication Networks 2020 (February 10, 2020): 1–20. http://dx.doi.org/10.1155/2020/8347213.
Full textGhanta, Jyothi, B. Tarakeswara, and B. Sathyanarayana. "Optimized Privacy-Preserving Access Control System for Relational Incremental Data." International Journal of Computer Applications 136, no. 7 (February 17, 2016): 16–19. http://dx.doi.org/10.5120/ijca2016908491.
Full textBuccafurri, Francesco, Gianluca Lax, Serena Nicolazzo, and Antonino Nocera. "A System for Privacy-Preserving Access Accountability in Critical Environments." IEEE Pervasive Computing 18, no. 2 (April 1, 2019): 58–66. http://dx.doi.org/10.1109/mprv.2018.2884125.
Full textLiu, Shengchao, Jessie Hui Wang, Jilong Wang, and Qianli Zhang. "Achieving User-Defined Location Privacy Preservation Using a P2P System." IEEE Access 8 (2020): 45895–912. http://dx.doi.org/10.1109/access.2020.2978488.
Full textJAKŠIĆ, SVETLANA, JOVANKA PANTOVIĆ, and SILVIA GHILEZAN. "Linked data privacy." Mathematical Structures in Computer Science 27, no. 1 (March 18, 2015): 33–53. http://dx.doi.org/10.1017/s096012951500002x.
Full textLiyanage, H., S. T. Liaw, C. T. Di Iorio, C. Kuziemsky, R. Schreiber, A. L. Terry, and S. de Lusignan. "Building a Privacy, Ethics, and Data Access Framework for Real World Computerised Medical Record System Data: A Delphi Study." Yearbook of Medical Informatics 25, no. 01 (August 2016): 138–45. http://dx.doi.org/10.15265/iy-2016-035.
Full textMandal, Ajaya, Prakriti Dumaru, Sagar Bhandari, Shreeti Shrestha, and Subarna Shakya. "Decentralized Electronic Health Record System." Journal of the Institute of Engineering 15, no. 1 (February 16, 2020): 77–80. http://dx.doi.org/10.3126/jie.v15i1.27716.
Full textHe, Ying, Beeshanga Abewardana Jayawickrama, Eryk Dutkiewicz, Srikathyayani Srikanteswara, and Markus Mueck. "Priority Access and General Authorized Access Interference Mitigation in the Spectrum Access System." IEEE Transactions on Vehicular Technology 67, no. 6 (June 2018): 4969–83. http://dx.doi.org/10.1109/tvt.2018.2797970.
Full textKasperbauer, T. J. "Protecting health privacy even when privacy is lost." Journal of Medical Ethics 46, no. 11 (December 5, 2019): 768–72. http://dx.doi.org/10.1136/medethics-2019-105880.
Full textMavridis, Ioannis. "Deploying Privacy Improved RBAC in Web Information Systems." International Journal of Information Technologies and Systems Approach 4, no. 2 (July 2011): 70–87. http://dx.doi.org/10.4018/jitsa.2011070105.
Full textWang, Jingwei, Xinchun Yin, and Jianting Ning. "Fine-Grained Task Access Control System for Mobile Crowdsensing." Security and Communication Networks 2021 (February 4, 2021): 1–13. http://dx.doi.org/10.1155/2021/6682456.
Full textWang, Gui Chao, Ai Li Zhang, and Yong Zhen Li. "Secure Authentication Protocol of RFID System Based on Access Control." Advanced Engineering Forum 6-7 (September 2012): 1072–77. http://dx.doi.org/10.4028/www.scientific.net/aef.6-7.1072.
Full textFarouk, Fifi, Yasmin Alkady, and Rawya Rizk. "Efficient Privacy-Preserving Scheme for Location Based Services in VANET System." IEEE Access 8 (2020): 60101–16. http://dx.doi.org/10.1109/access.2020.2982636.
Full textChiou, Shin-Yan, and Tzun-Yuan Tu. "A Trusted Mobile Ride-Hailing Evaluation System With Privacy and Authentication." IEEE Access 8 (2020): 61929–42. http://dx.doi.org/10.1109/access.2020.2983189.
Full textKim, Jong Wook, Kennedy Edemacu, and Beakcheol Jang. "MPPDS: Multilevel Privacy-Preserving Data Sharing in a Collaborative eHealth System." IEEE Access 7 (2019): 109910–23. http://dx.doi.org/10.1109/access.2019.2933542.
Full textBadr, Mahmoud M., Wesam Al Amiri, Mostafa M. Fouda, Mohamed M. E. A. Mahmoud, Abdulah Jeza Aljohani, and Waleed Alasmary. "Smart Parking System With Privacy Preservation and Reputation Management Using Blockchain." IEEE Access 8 (2020): 150823–43. http://dx.doi.org/10.1109/access.2020.3016945.
Full textShe, Wei, Zhi-Hao Gu, Xu-Kang Lyu, Qi Liu, Zhao Tian, and Wei Liu. "Homomorphic Consortium Blockchain for Smart Home System Sensitive Data Privacy Preserving." IEEE Access 7 (2019): 62058–70. http://dx.doi.org/10.1109/access.2019.2916345.
Full textNabil, Mahmoud, Ahmed Sherif, Mohamed Mahmoud, Waleed Alsmary, and Maazen Alsabaan. "Privacy-Preserving Non-Participatory Surveillance System for COVID-19-Like Pandemics." IEEE Access 9 (2021): 79911–26. http://dx.doi.org/10.1109/access.2021.3082910.
Full text.JAN, S., A. RAUF, R. SAEED, N. M. FANCY, F. Q. KHAN, G. AHMAD, and K. AZAM. "Monitoring and Controlling Access to Privacy Sensitive Resources of Android System." SINDH UNIVERSITY RESEARCH JOURNAL -SCIENCE SERIES 52, no. 1 (March 21, 2020): 49–56. http://dx.doi.org/10.26692/surj/2020.03.08.
Full textWang, Xiang, Heyu Xue, Xuefeng Liu, and Qingqi Pei. "A Privacy-Preserving Edge Computation-Based Face Verification System for User Authentication." IEEE Access 7 (2019): 14186–97. http://dx.doi.org/10.1109/access.2019.2894535.
Full textZheng, Dong, Chunming Jing, Rui Guo, Shiyao Gao, and Liang Wang. "A Traceable Blockchain-Based Access Authentication System With Privacy Preservation in VANETs." IEEE Access 7 (2019): 117716–26. http://dx.doi.org/10.1109/access.2019.2936575.
Full textSantana, Juan Ramon, Luis Sanchez, Pablo Sotres, Jorge Lanza, Tomas Llorente, and Luis Munoz. "A Privacy-Aware Crowd Management System for Smart Cities and Smart Buildings." IEEE Access 8 (2020): 135394–405. http://dx.doi.org/10.1109/access.2020.3010609.
Full textAl-Zubaidie, Mishall, Zhongwei Zhang, and Ji Zhang. "PAX: Using Pseudonymization and Anonymization to Protect Patients' Identities and Data in the Healthcare System." International Journal of Environmental Research and Public Health 16, no. 9 (April 27, 2019): 1490. http://dx.doi.org/10.3390/ijerph16091490.
Full textYang, Chao, Mei Wang, Lin Zheng, and Chaochen Tang. "Dual Function System With Shared Spectrum Using FMCW." IEEE Access 6 (2018): 79026–38. http://dx.doi.org/10.1109/access.2018.2842079.
Full text