Articoli di riviste sul tema "Private attribute"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Vedi i top-50 articoli di riviste per l'attività di ricerca sul tema "Private attribute".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Vedi gli articoli di riviste di molte aree scientifiche e compila una bibliografia corretta.
Lai, Jianchang, Yi Mu, Fuchun Guo, Peng Jiang e Willy Susilo. "Privacy-enhanced attribute-based private information retrieval". Information Sciences 454-455 (luglio 2018): 275–91. http://dx.doi.org/10.1016/j.ins.2018.04.084.
Zhang, Hao, Yue Zhao, Jintao Meng, Xue Wang e Kaijun Wu. "Attribute-Based Encryption Scheme with k-Out-of-n Oblivious Transfer". Electronics 12, n. 21 (1 novembre 2023): 4502. http://dx.doi.org/10.3390/electronics12214502.
Battaglia, Elena, Simone Celano e Ruggero G. Pensa. "Differentially Private Distance Learning in Categorical Data". Data Mining and Knowledge Discovery 35, n. 5 (13 luglio 2021): 2050–88. http://dx.doi.org/10.1007/s10618-021-00778-0.
Zhang, Guo Yan. "A Multi-Authority Attribute-Based Encryption System Against Malicious KGC". Advanced Engineering Forum 6-7 (settembre 2012): 38–44. http://dx.doi.org/10.4028/www.scientific.net/aef.6-7.38.
Rezaeifar, Shideh, Slava Voloshynovskiy, Meisam Asgari Asgari Jirhandeh e Vitality Kinakh. "Privacy-Preserving Image Template Sharing Using Contrastive Learning". Entropy 24, n. 5 (3 maggio 2022): 643. http://dx.doi.org/10.3390/e24050643.
Zhang, Runnan, Gang Liu, Shancang Li, Yongheng Wei e Quan Wang. "ABSAC: Attribute-Based Access Control Model Supporting Anonymous Access for Smart Cities". Security and Communication Networks 2021 (20 marzo 2021): 1–11. http://dx.doi.org/10.1155/2021/5531369.
Pin, Lim Wei, e Manmeet Mahinderjit Singh. "User authentication using gait and enhanced attribute-based encryption: a case of smart home". Bulletin of Electrical Engineering and Informatics 13, n. 3 (1 giugno 2024): 1839–46. http://dx.doi.org/10.11591/eei.v13i3.5347.
Han, Fei, e Jing Qin. "A Function Private Attribute-Based Encryption". International Journal of Distributed Sensor Networks 10, n. 1 (gennaio 2014): 749568. http://dx.doi.org/10.1155/2014/749568.
Mosteiro-Sanchez, Aintzane, Marc Barcelo, Jasone Astorga e Aitor Urbieta. "Trustworthy Users: Using IOTA and IPFS for Attribute Validation in CP-ABE and dCP-ABE Schemes". Smart Cities 6, n. 2 (10 marzo 2023): 913–28. http://dx.doi.org/10.3390/smartcities6020044.
Arroyo Arevalo, Caridad, Sayedeh Leila Noorbakhsh, Yun Dong, Yuan Hong e Binghui Wang. "Task-Agnostic Privacy-Preserving Representation Learning for Federated Learning against Attribute Inference Attacks". Proceedings of the AAAI Conference on Artificial Intelligence 38, n. 10 (24 marzo 2024): 10909–17. http://dx.doi.org/10.1609/aaai.v38i10.28965.
Setiawan, Raka Adji, Fauziah Fauziah e Ratih Titi Komala Sari. "Aplikasi Perbandingan Pemilihan Guru Private Homeschooling menggunakan Algoritma Simple Additive Weighting (SAW) dan Weight Product Berbasis Web". Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) 4, n. 2 (1 gennaio 2021): 14. http://dx.doi.org/10.35870/jtik.v5i1.195.
Yang, Kunwei, Bo Yang, Yanwei Zhou, Tao Wang e Linming Gong. "Privacy Protection of Task in Crowdsourcing: Policy-Hiding and Attribute Updating Attribute-Based Access Control Based on Blockchain". Wireless Communications and Mobile Computing 2022 (24 marzo 2022): 1–12. http://dx.doi.org/10.1155/2022/7787866.
Nandini, Ryke, Ambar Kusumandari, Totok Gunawan e Ronggo Sadono. "Multidimensional Scaling Approach to Evaluate the Level of Community Forestry Sustainability in Babak Watershed, Lombok Island, West Nusa Tenggara". Forum Geografi 31, n. 1 (1 luglio 2017): 28–42. http://dx.doi.org/10.23917/forgeo.v31i1.3371.
Al Karomi, M. Adib, Much Rifqi Maulana, Slamet Joko Prasetiono, Ivandari Ivandari e Arochman Arochman. "Strengthening campus finance by analyzing attribute attributes for student registration classifications". JAICT 4, n. 2 (26 giugno 2020): 1. http://dx.doi.org/10.32497/jaict.v4i2.1431.
Choi, Daeseon, Younho Lee, Seokhyun Kim e Pilsung Kang. "Private attribute inference from Facebook’s public text metadata: a case study of Korean users". Industrial Management & Data Systems 117, n. 8 (11 settembre 2017): 1687–706. http://dx.doi.org/10.1108/imds-07-2016-0276.
Kumar, G. Sravan, e A. Sri Krishna. "Data Security for Cloud Datasets With Bloom Filters on Ciphertext Policy Attribute Based Encryption". International Journal of Information Security and Privacy 13, n. 4 (ottobre 2019): 12–27. http://dx.doi.org/10.4018/ijisp.2019100102.
Chen, Chuanming, Wenshi Lin, Shuanggui Zhang, Zitong Ye, Qingying Yu e Yonglong Luo. "Personalized trajectory privacy-preserving method based on sensitive attribute generalization and location perturbation". Intelligent Data Analysis 25, n. 5 (15 settembre 2021): 1247–71. http://dx.doi.org/10.3233/ida-205306.
Aryanto, Rudy, Trisnasari, Haryadi Sarjono e Idris Gautama So. "Customer Interface Preferences to Ecotourism Destination Website". Advanced Materials Research 905 (aprile 2014): 706–10. http://dx.doi.org/10.4028/www.scientific.net/amr.905.706.
Mandloi, Dheeraj, e Vipul Thakur. "Public-Private Partnership Model as a Potential Attribute to Engineering and Society". International Journal of Scientific Research 2, n. 10 (1 giugno 2012): 1–4. http://dx.doi.org/10.15373/22778179/oct2013/39.
Vemou, Konstantina, e Maria Karyda. "Requirements for private communications over public spheres". Information & Computer Security 28, n. 1 (11 novembre 2019): 68–96. http://dx.doi.org/10.1108/ics-01-2019-0002.
Deb, Nabamita, Mohamed A. Elashiri, T. Veeramakali, Abdul Wahab Rahmani e Sheshang Degadwala. "A Metaheuristic Approach for Encrypting Blockchain Data Attributes Using Ciphertext Policy Technique". Mathematical Problems in Engineering 2022 (10 febbraio 2022): 1–10. http://dx.doi.org/10.1155/2022/7579961.
Suyono, Rudi Sugiono, Nurhayati Nurhayati e Wisa Yustrinisa. "Mode Selection Sensitivity Analysis between BRT and Private Vehicle (Case Study of Pontianak City CBD Area)". MEDIA KOMUNIKASI TEKNIK SIPIL 27, n. 1 (20 agosto 2021): 61–68. http://dx.doi.org/10.14710/mkts.v27i1.29306.
Priya, Aayushi, e Rajeev Tiwari. "A Survey: Attribute Based Encryption for Secure Cloud". IJOSTHE 5, n. 3 (1 giugno 2018): 12. http://dx.doi.org/10.24113/ojssports.v5i3.70.
Hou, Yibo. "Children's Right to Personal Information towards Public Law". Frontiers in Sustainable Development 2, n. 9 (30 settembre 2022): 44–47. http://dx.doi.org/10.54691/fsd.v2i9.2143.
Atre, Saloni, e Mayank Namdev. "Attribute-Based Homomorphic Encryption based Integrity Auditing for Secure Outsourced Storage in Cloud". SMART MOVES JOURNAL IJOSCIENCE 4, n. 8 (5 agosto 2018): 8. http://dx.doi.org/10.24113/ijoscience.v4i8.150.
Yang, Gaoming, Xinxin Ye, Xianjin Fang, Rongshi Wu e Li Wang. "Associated Attribute-Aware Differentially Private Data Publishing via Microaggregation". IEEE Access 8 (2020): 79158–68. http://dx.doi.org/10.1109/access.2020.2990296.
Frederiksen, Tore Kasper, Julia Hesse, Bertram Poettering e Patrick Towa. "Attribute-based Single Sign-On: Secure, Private, and Efficient". Proceedings on Privacy Enhancing Technologies 2023, n. 4 (ottobre 2023): 35–65. http://dx.doi.org/10.56553/popets-2023-0097.
Zhang, Xiao Lei, e Yi Tang. "Protecting Encrypted Data against Inference Attacks in Outsourced Databases". Applied Mechanics and Materials 571-572 (giugno 2014): 621–25. http://dx.doi.org/10.4028/www.scientific.net/amm.571-572.621.
Senthil Kumar, K., e D. Malathi. "A Novel method to represent Access Tree structure by Context Free Grammar with and-or graph in Key Policy based Attribute based Encryption". International Journal of Engineering & Technology 7, n. 4.10 (2 ottobre 2018): 396. http://dx.doi.org/10.14419/ijet.v7i4.10.20946.
Chan, Eric S. W., e Louisa Lam. "Understanding attributes affecting selection of private kitchens". International Journal of Contemporary Hospitality Management 21, n. 7 (2 ottobre 2009): 854–75. http://dx.doi.org/10.1108/09596110910985322.
Kulikov, Fedor I. "REVISITING THE MECHANISMS OF FUNCTIONING OF THE ARTISTIC SPACE OF AN OLD EGYPTIAN PRIVATE TOMB". Russian Studies in Culture and Society 7, n. 3 (23 dicembre 2023): 102–16. http://dx.doi.org/10.12731/2576-9782-2023-3-102-116.
Ramadhan, Aditya, Suryawan Murtiadi e I. Ketut Budastra. "An Analysis of Consumer Preference to Residential Houses in West Java Province". RESEARCH REVIEW International Journal of Multidisciplinary 8, n. 7 (15 luglio 2023): 38–47. http://dx.doi.org/10.31305/rrijm.2023.v08.n07.006.
Yang, Qing, Cheng Wang, Teng Hu, Xue Chen e Changjun Jiang. "Implicit privacy preservation: a framework based on data generation". Security and Safety 1 (2022): 2022008. http://dx.doi.org/10.1051/sands/2022008.
Liu, Chenlei, Feng Xiang e Zhixin Sun. "Multiauthority Attribute-Based Access Control for Supply Chain Information Sharing in Blockchain". Security and Communication Networks 2022 (12 aprile 2022): 1–18. http://dx.doi.org/10.1155/2022/8497628.
Oktaviana, Tifany, Dwi Haryono e Erlina Rufaidah. "SIKAP DAN KEPUASAN KONSUMEN KOPI BUBUK GUNUNG SEKINCAU DI KECAMATAN SEKINCAU KABUPATEN LAMPUNG BARAT". Jurnal Ilmu-Ilmu Agribisnis 11, n. 1 (1 febbraio 2023): 9. http://dx.doi.org/10.23960/jiia.v11i1.6127.
Manouselis, Nikos, e Andreas M. Maras. "Multi-attribute Services Brokering in Agent-based Virtual Private Networks". Computing Letters 1, n. 3 (6 marzo 2005): 137–43. http://dx.doi.org/10.1163/1574040054861230.
Wang, Changji, e Jianfa Luo. "An Efficient Key-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length". Mathematical Problems in Engineering 2013 (2013): 1–7. http://dx.doi.org/10.1155/2013/810969.
Vishnoi, Meenakshi, e Seeja K. R. "Privacy Preserving Data Mining using Attribute Encryption and Data Perturbation". INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 6, n. 3 (25 maggio 2013): 370–78. http://dx.doi.org/10.24297/ijct.v6i3.4461.
Lian, Huijie, Qingxian Wang e Guangbo Wang. "Large Universe Ciphertext-Policy Attribute-Based Encryption with Attribute Level User Revocation in Cloud Storage". International Arab Journal of Information Technology 17, n. 1 (1 gennaio 2019): 107–17. http://dx.doi.org/10.34028/iajit/17/1/13.
Liu, Zichun, Liusheng Huang, Hongli Xu e Wei Yang. "Locally Differentially Private Heterogeneous Graph Aggregation with Utility Optimization". Entropy 25, n. 1 (9 gennaio 2023): 130. http://dx.doi.org/10.3390/e25010130.
Fan, Meng, e Jinping Dai. "Monetary attribute of stablecoins: A theoretical and empirical test". National Accounting Review 5, n. 3 (2023): 261–81. http://dx.doi.org/10.3934/nar.2023016.
Qaosar, Mahboob, Asif Zaman, Md Siddique, Annisa e Yasuhiko Morimoto. "Privacy-Preserving Secure Computation of Skyline Query in Distributed Multi-Party Databases". Information 10, n. 3 (25 marzo 2019): 119. http://dx.doi.org/10.3390/info10030119.
Saranya, K., e K. Premalatha. "Private Frequent Item Set Mining in Smart Splitting for Privacy Preserving using Attribute Probability Matrix". Asian Journal of Research in Social Sciences and Humanities 6, n. 10 (2016): 2265. http://dx.doi.org/10.5958/2249-7315.2016.01167.9.
Kumar, G. Sravan. "Efficient Data Access Control for Cloud Computing With Large Universe and Traceable Attribute-Based Encryption". International Journal of Fuzzy System Applications 9, n. 4 (ottobre 2020): 61–81. http://dx.doi.org/10.4018/ijfsa.2020100103.
Liu, Jie, Guangli Xiang, Chengde Li e Weiping Xie. "Traceable Attribute-Based Encryption Scheme Using BIM Collaborative Design". Buildings 14, n. 3 (8 marzo 2024): 731. http://dx.doi.org/10.3390/buildings14030731.
He, Qingsu, Yu Xu, Zhoubin Liu, Jinhong He, You Sun e Rui Zhang. "A privacy-preserving Internet of Things device management scheme based on blockchain". International Journal of Distributed Sensor Networks 14, n. 11 (novembre 2018): 155014771880875. http://dx.doi.org/10.1177/1550147718808750.
Levy, Sheldon G. "Peace Science: A Multiple Attribute Approach". Peace Economics, Peace Science and Public Policy 20, n. 3 (1 agosto 2014): 429–40. http://dx.doi.org/10.1515/peps-2014-0013.
Singaravelan, Shanmugasundaram, Ramaiah Arun, Dhiraviyam Arun Shunmugam, Raja Veeman Vivek e Dhanushkodi Murugan. "Access control scheme in cloud services based on different user roles". Informatologia 51, n. 3-4 (30 dicembre 2018): 182–88. http://dx.doi.org/10.32914/i.51.3-4.6.
Bakar, Nurul Qistina Binti Abu. "MORAL LEADERSHIP AMONG HEADS OF DEPARTMENTS AT SELECTED PRIVATE INSTITUTIONS IN KLANG VALLEY". Educational Administration Research and Review 1, n. 2 (29 novembre 2019): 52–61. http://dx.doi.org/10.17509/earr.v1i2.21417.
Wang, Guangbo, e Jianhua Wang. "Research on Ciphertext-Policy Attribute-Based Encryption with Attribute Level User Revocation in Cloud Storage". Mathematical Problems in Engineering 2017 (2017): 1–12. http://dx.doi.org/10.1155/2017/4070616.