Artículos de revistas sobre el tema "Private attribute"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Private attribute".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Lai, Jianchang, Yi Mu, Fuchun Guo, Peng Jiang y Willy Susilo. "Privacy-enhanced attribute-based private information retrieval". Information Sciences 454-455 (julio de 2018): 275–91. http://dx.doi.org/10.1016/j.ins.2018.04.084.
Texto completoZhang, Hao, Yue Zhao, Jintao Meng, Xue Wang y Kaijun Wu. "Attribute-Based Encryption Scheme with k-Out-of-n Oblivious Transfer". Electronics 12, n.º 21 (1 de noviembre de 2023): 4502. http://dx.doi.org/10.3390/electronics12214502.
Texto completoBattaglia, Elena, Simone Celano y Ruggero G. Pensa. "Differentially Private Distance Learning in Categorical Data". Data Mining and Knowledge Discovery 35, n.º 5 (13 de julio de 2021): 2050–88. http://dx.doi.org/10.1007/s10618-021-00778-0.
Texto completoZhang, Guo Yan. "A Multi-Authority Attribute-Based Encryption System Against Malicious KGC". Advanced Engineering Forum 6-7 (septiembre de 2012): 38–44. http://dx.doi.org/10.4028/www.scientific.net/aef.6-7.38.
Texto completoRezaeifar, Shideh, Slava Voloshynovskiy, Meisam Asgari Asgari Jirhandeh y Vitality Kinakh. "Privacy-Preserving Image Template Sharing Using Contrastive Learning". Entropy 24, n.º 5 (3 de mayo de 2022): 643. http://dx.doi.org/10.3390/e24050643.
Texto completoZhang, Runnan, Gang Liu, Shancang Li, Yongheng Wei y Quan Wang. "ABSAC: Attribute-Based Access Control Model Supporting Anonymous Access for Smart Cities". Security and Communication Networks 2021 (20 de marzo de 2021): 1–11. http://dx.doi.org/10.1155/2021/5531369.
Texto completoPin, Lim Wei y Manmeet Mahinderjit Singh. "User authentication using gait and enhanced attribute-based encryption: a case of smart home". Bulletin of Electrical Engineering and Informatics 13, n.º 3 (1 de junio de 2024): 1839–46. http://dx.doi.org/10.11591/eei.v13i3.5347.
Texto completoHan, Fei y Jing Qin. "A Function Private Attribute-Based Encryption". International Journal of Distributed Sensor Networks 10, n.º 1 (enero de 2014): 749568. http://dx.doi.org/10.1155/2014/749568.
Texto completoMosteiro-Sanchez, Aintzane, Marc Barcelo, Jasone Astorga y Aitor Urbieta. "Trustworthy Users: Using IOTA and IPFS for Attribute Validation in CP-ABE and dCP-ABE Schemes". Smart Cities 6, n.º 2 (10 de marzo de 2023): 913–28. http://dx.doi.org/10.3390/smartcities6020044.
Texto completoArroyo Arevalo, Caridad, Sayedeh Leila Noorbakhsh, Yun Dong, Yuan Hong y Binghui Wang. "Task-Agnostic Privacy-Preserving Representation Learning for Federated Learning against Attribute Inference Attacks". Proceedings of the AAAI Conference on Artificial Intelligence 38, n.º 10 (24 de marzo de 2024): 10909–17. http://dx.doi.org/10.1609/aaai.v38i10.28965.
Texto completoSetiawan, Raka Adji, Fauziah Fauziah y Ratih Titi Komala Sari. "Aplikasi Perbandingan Pemilihan Guru Private Homeschooling menggunakan Algoritma Simple Additive Weighting (SAW) dan Weight Product Berbasis Web". Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) 4, n.º 2 (1 de enero de 2021): 14. http://dx.doi.org/10.35870/jtik.v5i1.195.
Texto completoYang, Kunwei, Bo Yang, Yanwei Zhou, Tao Wang y Linming Gong. "Privacy Protection of Task in Crowdsourcing: Policy-Hiding and Attribute Updating Attribute-Based Access Control Based on Blockchain". Wireless Communications and Mobile Computing 2022 (24 de marzo de 2022): 1–12. http://dx.doi.org/10.1155/2022/7787866.
Texto completoNandini, Ryke, Ambar Kusumandari, Totok Gunawan y Ronggo Sadono. "Multidimensional Scaling Approach to Evaluate the Level of Community Forestry Sustainability in Babak Watershed, Lombok Island, West Nusa Tenggara". Forum Geografi 31, n.º 1 (1 de julio de 2017): 28–42. http://dx.doi.org/10.23917/forgeo.v31i1.3371.
Texto completoAl Karomi, M. Adib, Much Rifqi Maulana, Slamet Joko Prasetiono, Ivandari Ivandari y Arochman Arochman. "Strengthening campus finance by analyzing attribute attributes for student registration classifications". JAICT 4, n.º 2 (26 de junio de 2020): 1. http://dx.doi.org/10.32497/jaict.v4i2.1431.
Texto completoChoi, Daeseon, Younho Lee, Seokhyun Kim y Pilsung Kang. "Private attribute inference from Facebook’s public text metadata: a case study of Korean users". Industrial Management & Data Systems 117, n.º 8 (11 de septiembre de 2017): 1687–706. http://dx.doi.org/10.1108/imds-07-2016-0276.
Texto completoKumar, G. Sravan y A. Sri Krishna. "Data Security for Cloud Datasets With Bloom Filters on Ciphertext Policy Attribute Based Encryption". International Journal of Information Security and Privacy 13, n.º 4 (octubre de 2019): 12–27. http://dx.doi.org/10.4018/ijisp.2019100102.
Texto completoChen, Chuanming, Wenshi Lin, Shuanggui Zhang, Zitong Ye, Qingying Yu y Yonglong Luo. "Personalized trajectory privacy-preserving method based on sensitive attribute generalization and location perturbation". Intelligent Data Analysis 25, n.º 5 (15 de septiembre de 2021): 1247–71. http://dx.doi.org/10.3233/ida-205306.
Texto completoAryanto, Rudy, Trisnasari, Haryadi Sarjono y Idris Gautama So. "Customer Interface Preferences to Ecotourism Destination Website". Advanced Materials Research 905 (abril de 2014): 706–10. http://dx.doi.org/10.4028/www.scientific.net/amr.905.706.
Texto completoMandloi, Dheeraj y Vipul Thakur. "Public-Private Partnership Model as a Potential Attribute to Engineering and Society". International Journal of Scientific Research 2, n.º 10 (1 de junio de 2012): 1–4. http://dx.doi.org/10.15373/22778179/oct2013/39.
Texto completoVemou, Konstantina y Maria Karyda. "Requirements for private communications over public spheres". Information & Computer Security 28, n.º 1 (11 de noviembre de 2019): 68–96. http://dx.doi.org/10.1108/ics-01-2019-0002.
Texto completoDeb, Nabamita, Mohamed A. Elashiri, T. Veeramakali, Abdul Wahab Rahmani y Sheshang Degadwala. "A Metaheuristic Approach for Encrypting Blockchain Data Attributes Using Ciphertext Policy Technique". Mathematical Problems in Engineering 2022 (10 de febrero de 2022): 1–10. http://dx.doi.org/10.1155/2022/7579961.
Texto completoSuyono, Rudi Sugiono, Nurhayati Nurhayati y Wisa Yustrinisa. "Mode Selection Sensitivity Analysis between BRT and Private Vehicle (Case Study of Pontianak City CBD Area)". MEDIA KOMUNIKASI TEKNIK SIPIL 27, n.º 1 (20 de agosto de 2021): 61–68. http://dx.doi.org/10.14710/mkts.v27i1.29306.
Texto completoPriya, Aayushi y Rajeev Tiwari. "A Survey: Attribute Based Encryption for Secure Cloud". IJOSTHE 5, n.º 3 (1 de junio de 2018): 12. http://dx.doi.org/10.24113/ojssports.v5i3.70.
Texto completoHou, Yibo. "Children's Right to Personal Information towards Public Law". Frontiers in Sustainable Development 2, n.º 9 (30 de septiembre de 2022): 44–47. http://dx.doi.org/10.54691/fsd.v2i9.2143.
Texto completoAtre, Saloni y Mayank Namdev. "Attribute-Based Homomorphic Encryption based Integrity Auditing for Secure Outsourced Storage in Cloud". SMART MOVES JOURNAL IJOSCIENCE 4, n.º 8 (5 de agosto de 2018): 8. http://dx.doi.org/10.24113/ijoscience.v4i8.150.
Texto completoYang, Gaoming, Xinxin Ye, Xianjin Fang, Rongshi Wu y Li Wang. "Associated Attribute-Aware Differentially Private Data Publishing via Microaggregation". IEEE Access 8 (2020): 79158–68. http://dx.doi.org/10.1109/access.2020.2990296.
Texto completoFrederiksen, Tore Kasper, Julia Hesse, Bertram Poettering y Patrick Towa. "Attribute-based Single Sign-On: Secure, Private, and Efficient". Proceedings on Privacy Enhancing Technologies 2023, n.º 4 (octubre de 2023): 35–65. http://dx.doi.org/10.56553/popets-2023-0097.
Texto completoZhang, Xiao Lei y Yi Tang. "Protecting Encrypted Data against Inference Attacks in Outsourced Databases". Applied Mechanics and Materials 571-572 (junio de 2014): 621–25. http://dx.doi.org/10.4028/www.scientific.net/amm.571-572.621.
Texto completoSenthil Kumar, K. y D. Malathi. "A Novel method to represent Access Tree structure by Context Free Grammar with and-or graph in Key Policy based Attribute based Encryption". International Journal of Engineering & Technology 7, n.º 4.10 (2 de octubre de 2018): 396. http://dx.doi.org/10.14419/ijet.v7i4.10.20946.
Texto completoChan, Eric S. W. y Louisa Lam. "Understanding attributes affecting selection of private kitchens". International Journal of Contemporary Hospitality Management 21, n.º 7 (2 de octubre de 2009): 854–75. http://dx.doi.org/10.1108/09596110910985322.
Texto completoKulikov, Fedor I. "REVISITING THE MECHANISMS OF FUNCTIONING OF THE ARTISTIC SPACE OF AN OLD EGYPTIAN PRIVATE TOMB". Russian Studies in Culture and Society 7, n.º 3 (23 de diciembre de 2023): 102–16. http://dx.doi.org/10.12731/2576-9782-2023-3-102-116.
Texto completoRamadhan, Aditya, Suryawan Murtiadi y I. Ketut Budastra. "An Analysis of Consumer Preference to Residential Houses in West Java Province". RESEARCH REVIEW International Journal of Multidisciplinary 8, n.º 7 (15 de julio de 2023): 38–47. http://dx.doi.org/10.31305/rrijm.2023.v08.n07.006.
Texto completoYang, Qing, Cheng Wang, Teng Hu, Xue Chen y Changjun Jiang. "Implicit privacy preservation: a framework based on data generation". Security and Safety 1 (2022): 2022008. http://dx.doi.org/10.1051/sands/2022008.
Texto completoLiu, Chenlei, Feng Xiang y Zhixin Sun. "Multiauthority Attribute-Based Access Control for Supply Chain Information Sharing in Blockchain". Security and Communication Networks 2022 (12 de abril de 2022): 1–18. http://dx.doi.org/10.1155/2022/8497628.
Texto completoOktaviana, Tifany, Dwi Haryono y Erlina Rufaidah. "SIKAP DAN KEPUASAN KONSUMEN KOPI BUBUK GUNUNG SEKINCAU DI KECAMATAN SEKINCAU KABUPATEN LAMPUNG BARAT". Jurnal Ilmu-Ilmu Agribisnis 11, n.º 1 (1 de febrero de 2023): 9. http://dx.doi.org/10.23960/jiia.v11i1.6127.
Texto completoManouselis, Nikos y Andreas M. Maras. "Multi-attribute Services Brokering in Agent-based Virtual Private Networks". Computing Letters 1, n.º 3 (6 de marzo de 2005): 137–43. http://dx.doi.org/10.1163/1574040054861230.
Texto completoWang, Changji y Jianfa Luo. "An Efficient Key-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length". Mathematical Problems in Engineering 2013 (2013): 1–7. http://dx.doi.org/10.1155/2013/810969.
Texto completoVishnoi, Meenakshi y Seeja K. R. "Privacy Preserving Data Mining using Attribute Encryption and Data Perturbation". INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 6, n.º 3 (25 de mayo de 2013): 370–78. http://dx.doi.org/10.24297/ijct.v6i3.4461.
Texto completoLian, Huijie, Qingxian Wang y Guangbo Wang. "Large Universe Ciphertext-Policy Attribute-Based Encryption with Attribute Level User Revocation in Cloud Storage". International Arab Journal of Information Technology 17, n.º 1 (1 de enero de 2019): 107–17. http://dx.doi.org/10.34028/iajit/17/1/13.
Texto completoLiu, Zichun, Liusheng Huang, Hongli Xu y Wei Yang. "Locally Differentially Private Heterogeneous Graph Aggregation with Utility Optimization". Entropy 25, n.º 1 (9 de enero de 2023): 130. http://dx.doi.org/10.3390/e25010130.
Texto completoFan, Meng y Jinping Dai. "Monetary attribute of stablecoins: A theoretical and empirical test". National Accounting Review 5, n.º 3 (2023): 261–81. http://dx.doi.org/10.3934/nar.2023016.
Texto completoQaosar, Mahboob, Asif Zaman, Md Siddique, Annisa y Yasuhiko Morimoto. "Privacy-Preserving Secure Computation of Skyline Query in Distributed Multi-Party Databases". Information 10, n.º 3 (25 de marzo de 2019): 119. http://dx.doi.org/10.3390/info10030119.
Texto completoSaranya, K. y K. Premalatha. "Private Frequent Item Set Mining in Smart Splitting for Privacy Preserving using Attribute Probability Matrix". Asian Journal of Research in Social Sciences and Humanities 6, n.º 10 (2016): 2265. http://dx.doi.org/10.5958/2249-7315.2016.01167.9.
Texto completoKumar, G. Sravan. "Efficient Data Access Control for Cloud Computing With Large Universe and Traceable Attribute-Based Encryption". International Journal of Fuzzy System Applications 9, n.º 4 (octubre de 2020): 61–81. http://dx.doi.org/10.4018/ijfsa.2020100103.
Texto completoLiu, Jie, Guangli Xiang, Chengde Li y Weiping Xie. "Traceable Attribute-Based Encryption Scheme Using BIM Collaborative Design". Buildings 14, n.º 3 (8 de marzo de 2024): 731. http://dx.doi.org/10.3390/buildings14030731.
Texto completoHe, Qingsu, Yu Xu, Zhoubin Liu, Jinhong He, You Sun y Rui Zhang. "A privacy-preserving Internet of Things device management scheme based on blockchain". International Journal of Distributed Sensor Networks 14, n.º 11 (noviembre de 2018): 155014771880875. http://dx.doi.org/10.1177/1550147718808750.
Texto completoLevy, Sheldon G. "Peace Science: A Multiple Attribute Approach". Peace Economics, Peace Science and Public Policy 20, n.º 3 (1 de agosto de 2014): 429–40. http://dx.doi.org/10.1515/peps-2014-0013.
Texto completoSingaravelan, Shanmugasundaram, Ramaiah Arun, Dhiraviyam Arun Shunmugam, Raja Veeman Vivek y Dhanushkodi Murugan. "Access control scheme in cloud services based on different user roles". Informatologia 51, n.º 3-4 (30 de diciembre de 2018): 182–88. http://dx.doi.org/10.32914/i.51.3-4.6.
Texto completoBakar, Nurul Qistina Binti Abu. "MORAL LEADERSHIP AMONG HEADS OF DEPARTMENTS AT SELECTED PRIVATE INSTITUTIONS IN KLANG VALLEY". Educational Administration Research and Review 1, n.º 2 (29 de noviembre de 2019): 52–61. http://dx.doi.org/10.17509/earr.v1i2.21417.
Texto completoWang, Guangbo y Jianhua Wang. "Research on Ciphertext-Policy Attribute-Based Encryption with Attribute Level User Revocation in Cloud Storage". Mathematical Problems in Engineering 2017 (2017): 1–12. http://dx.doi.org/10.1155/2017/4070616.
Texto completo