Artykuły w czasopismach na temat „Private attribute”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „Private attribute”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.
Lai, Jianchang, Yi Mu, Fuchun Guo, Peng Jiang i Willy Susilo. "Privacy-enhanced attribute-based private information retrieval". Information Sciences 454-455 (lipiec 2018): 275–91. http://dx.doi.org/10.1016/j.ins.2018.04.084.
Pełny tekst źródłaZhang, Hao, Yue Zhao, Jintao Meng, Xue Wang i Kaijun Wu. "Attribute-Based Encryption Scheme with k-Out-of-n Oblivious Transfer". Electronics 12, nr 21 (1.11.2023): 4502. http://dx.doi.org/10.3390/electronics12214502.
Pełny tekst źródłaBattaglia, Elena, Simone Celano i Ruggero G. Pensa. "Differentially Private Distance Learning in Categorical Data". Data Mining and Knowledge Discovery 35, nr 5 (13.07.2021): 2050–88. http://dx.doi.org/10.1007/s10618-021-00778-0.
Pełny tekst źródłaZhang, Guo Yan. "A Multi-Authority Attribute-Based Encryption System Against Malicious KGC". Advanced Engineering Forum 6-7 (wrzesień 2012): 38–44. http://dx.doi.org/10.4028/www.scientific.net/aef.6-7.38.
Pełny tekst źródłaRezaeifar, Shideh, Slava Voloshynovskiy, Meisam Asgari Asgari Jirhandeh i Vitality Kinakh. "Privacy-Preserving Image Template Sharing Using Contrastive Learning". Entropy 24, nr 5 (3.05.2022): 643. http://dx.doi.org/10.3390/e24050643.
Pełny tekst źródłaZhang, Runnan, Gang Liu, Shancang Li, Yongheng Wei i Quan Wang. "ABSAC: Attribute-Based Access Control Model Supporting Anonymous Access for Smart Cities". Security and Communication Networks 2021 (20.03.2021): 1–11. http://dx.doi.org/10.1155/2021/5531369.
Pełny tekst źródłaPin, Lim Wei, i Manmeet Mahinderjit Singh. "User authentication using gait and enhanced attribute-based encryption: a case of smart home". Bulletin of Electrical Engineering and Informatics 13, nr 3 (1.06.2024): 1839–46. http://dx.doi.org/10.11591/eei.v13i3.5347.
Pełny tekst źródłaHan, Fei, i Jing Qin. "A Function Private Attribute-Based Encryption". International Journal of Distributed Sensor Networks 10, nr 1 (styczeń 2014): 749568. http://dx.doi.org/10.1155/2014/749568.
Pełny tekst źródłaMosteiro-Sanchez, Aintzane, Marc Barcelo, Jasone Astorga i Aitor Urbieta. "Trustworthy Users: Using IOTA and IPFS for Attribute Validation in CP-ABE and dCP-ABE Schemes". Smart Cities 6, nr 2 (10.03.2023): 913–28. http://dx.doi.org/10.3390/smartcities6020044.
Pełny tekst źródłaArroyo Arevalo, Caridad, Sayedeh Leila Noorbakhsh, Yun Dong, Yuan Hong i Binghui Wang. "Task-Agnostic Privacy-Preserving Representation Learning for Federated Learning against Attribute Inference Attacks". Proceedings of the AAAI Conference on Artificial Intelligence 38, nr 10 (24.03.2024): 10909–17. http://dx.doi.org/10.1609/aaai.v38i10.28965.
Pełny tekst źródłaSetiawan, Raka Adji, Fauziah Fauziah i Ratih Titi Komala Sari. "Aplikasi Perbandingan Pemilihan Guru Private Homeschooling menggunakan Algoritma Simple Additive Weighting (SAW) dan Weight Product Berbasis Web". Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) 4, nr 2 (1.01.2021): 14. http://dx.doi.org/10.35870/jtik.v5i1.195.
Pełny tekst źródłaYang, Kunwei, Bo Yang, Yanwei Zhou, Tao Wang i Linming Gong. "Privacy Protection of Task in Crowdsourcing: Policy-Hiding and Attribute Updating Attribute-Based Access Control Based on Blockchain". Wireless Communications and Mobile Computing 2022 (24.03.2022): 1–12. http://dx.doi.org/10.1155/2022/7787866.
Pełny tekst źródłaNandini, Ryke, Ambar Kusumandari, Totok Gunawan i Ronggo Sadono. "Multidimensional Scaling Approach to Evaluate the Level of Community Forestry Sustainability in Babak Watershed, Lombok Island, West Nusa Tenggara". Forum Geografi 31, nr 1 (1.07.2017): 28–42. http://dx.doi.org/10.23917/forgeo.v31i1.3371.
Pełny tekst źródłaAl Karomi, M. Adib, Much Rifqi Maulana, Slamet Joko Prasetiono, Ivandari Ivandari i Arochman Arochman. "Strengthening campus finance by analyzing attribute attributes for student registration classifications". JAICT 4, nr 2 (26.06.2020): 1. http://dx.doi.org/10.32497/jaict.v4i2.1431.
Pełny tekst źródłaChoi, Daeseon, Younho Lee, Seokhyun Kim i Pilsung Kang. "Private attribute inference from Facebook’s public text metadata: a case study of Korean users". Industrial Management & Data Systems 117, nr 8 (11.09.2017): 1687–706. http://dx.doi.org/10.1108/imds-07-2016-0276.
Pełny tekst źródłaKumar, G. Sravan, i A. Sri Krishna. "Data Security for Cloud Datasets With Bloom Filters on Ciphertext Policy Attribute Based Encryption". International Journal of Information Security and Privacy 13, nr 4 (październik 2019): 12–27. http://dx.doi.org/10.4018/ijisp.2019100102.
Pełny tekst źródłaChen, Chuanming, Wenshi Lin, Shuanggui Zhang, Zitong Ye, Qingying Yu i Yonglong Luo. "Personalized trajectory privacy-preserving method based on sensitive attribute generalization and location perturbation". Intelligent Data Analysis 25, nr 5 (15.09.2021): 1247–71. http://dx.doi.org/10.3233/ida-205306.
Pełny tekst źródłaAryanto, Rudy, Trisnasari, Haryadi Sarjono i Idris Gautama So. "Customer Interface Preferences to Ecotourism Destination Website". Advanced Materials Research 905 (kwiecień 2014): 706–10. http://dx.doi.org/10.4028/www.scientific.net/amr.905.706.
Pełny tekst źródłaMandloi, Dheeraj, i Vipul Thakur. "Public-Private Partnership Model as a Potential Attribute to Engineering and Society". International Journal of Scientific Research 2, nr 10 (1.06.2012): 1–4. http://dx.doi.org/10.15373/22778179/oct2013/39.
Pełny tekst źródłaVemou, Konstantina, i Maria Karyda. "Requirements for private communications over public spheres". Information & Computer Security 28, nr 1 (11.11.2019): 68–96. http://dx.doi.org/10.1108/ics-01-2019-0002.
Pełny tekst źródłaDeb, Nabamita, Mohamed A. Elashiri, T. Veeramakali, Abdul Wahab Rahmani i Sheshang Degadwala. "A Metaheuristic Approach for Encrypting Blockchain Data Attributes Using Ciphertext Policy Technique". Mathematical Problems in Engineering 2022 (10.02.2022): 1–10. http://dx.doi.org/10.1155/2022/7579961.
Pełny tekst źródłaSuyono, Rudi Sugiono, Nurhayati Nurhayati i Wisa Yustrinisa. "Mode Selection Sensitivity Analysis between BRT and Private Vehicle (Case Study of Pontianak City CBD Area)". MEDIA KOMUNIKASI TEKNIK SIPIL 27, nr 1 (20.08.2021): 61–68. http://dx.doi.org/10.14710/mkts.v27i1.29306.
Pełny tekst źródłaPriya, Aayushi, i Rajeev Tiwari. "A Survey: Attribute Based Encryption for Secure Cloud". IJOSTHE 5, nr 3 (1.06.2018): 12. http://dx.doi.org/10.24113/ojssports.v5i3.70.
Pełny tekst źródłaHou, Yibo. "Children's Right to Personal Information towards Public Law". Frontiers in Sustainable Development 2, nr 9 (30.09.2022): 44–47. http://dx.doi.org/10.54691/fsd.v2i9.2143.
Pełny tekst źródłaAtre, Saloni, i Mayank Namdev. "Attribute-Based Homomorphic Encryption based Integrity Auditing for Secure Outsourced Storage in Cloud". SMART MOVES JOURNAL IJOSCIENCE 4, nr 8 (5.08.2018): 8. http://dx.doi.org/10.24113/ijoscience.v4i8.150.
Pełny tekst źródłaYang, Gaoming, Xinxin Ye, Xianjin Fang, Rongshi Wu i Li Wang. "Associated Attribute-Aware Differentially Private Data Publishing via Microaggregation". IEEE Access 8 (2020): 79158–68. http://dx.doi.org/10.1109/access.2020.2990296.
Pełny tekst źródłaFrederiksen, Tore Kasper, Julia Hesse, Bertram Poettering i Patrick Towa. "Attribute-based Single Sign-On: Secure, Private, and Efficient". Proceedings on Privacy Enhancing Technologies 2023, nr 4 (październik 2023): 35–65. http://dx.doi.org/10.56553/popets-2023-0097.
Pełny tekst źródłaZhang, Xiao Lei, i Yi Tang. "Protecting Encrypted Data against Inference Attacks in Outsourced Databases". Applied Mechanics and Materials 571-572 (czerwiec 2014): 621–25. http://dx.doi.org/10.4028/www.scientific.net/amm.571-572.621.
Pełny tekst źródłaSenthil Kumar, K., i D. Malathi. "A Novel method to represent Access Tree structure by Context Free Grammar with and-or graph in Key Policy based Attribute based Encryption". International Journal of Engineering & Technology 7, nr 4.10 (2.10.2018): 396. http://dx.doi.org/10.14419/ijet.v7i4.10.20946.
Pełny tekst źródłaChan, Eric S. W., i Louisa Lam. "Understanding attributes affecting selection of private kitchens". International Journal of Contemporary Hospitality Management 21, nr 7 (2.10.2009): 854–75. http://dx.doi.org/10.1108/09596110910985322.
Pełny tekst źródłaKulikov, Fedor I. "REVISITING THE MECHANISMS OF FUNCTIONING OF THE ARTISTIC SPACE OF AN OLD EGYPTIAN PRIVATE TOMB". Russian Studies in Culture and Society 7, nr 3 (23.12.2023): 102–16. http://dx.doi.org/10.12731/2576-9782-2023-3-102-116.
Pełny tekst źródłaRamadhan, Aditya, Suryawan Murtiadi i I. Ketut Budastra. "An Analysis of Consumer Preference to Residential Houses in West Java Province". RESEARCH REVIEW International Journal of Multidisciplinary 8, nr 7 (15.07.2023): 38–47. http://dx.doi.org/10.31305/rrijm.2023.v08.n07.006.
Pełny tekst źródłaYang, Qing, Cheng Wang, Teng Hu, Xue Chen i Changjun Jiang. "Implicit privacy preservation: a framework based on data generation". Security and Safety 1 (2022): 2022008. http://dx.doi.org/10.1051/sands/2022008.
Pełny tekst źródłaLiu, Chenlei, Feng Xiang i Zhixin Sun. "Multiauthority Attribute-Based Access Control for Supply Chain Information Sharing in Blockchain". Security and Communication Networks 2022 (12.04.2022): 1–18. http://dx.doi.org/10.1155/2022/8497628.
Pełny tekst źródłaOktaviana, Tifany, Dwi Haryono i Erlina Rufaidah. "SIKAP DAN KEPUASAN KONSUMEN KOPI BUBUK GUNUNG SEKINCAU DI KECAMATAN SEKINCAU KABUPATEN LAMPUNG BARAT". Jurnal Ilmu-Ilmu Agribisnis 11, nr 1 (1.02.2023): 9. http://dx.doi.org/10.23960/jiia.v11i1.6127.
Pełny tekst źródłaManouselis, Nikos, i Andreas M. Maras. "Multi-attribute Services Brokering in Agent-based Virtual Private Networks". Computing Letters 1, nr 3 (6.03.2005): 137–43. http://dx.doi.org/10.1163/1574040054861230.
Pełny tekst źródłaWang, Changji, i Jianfa Luo. "An Efficient Key-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length". Mathematical Problems in Engineering 2013 (2013): 1–7. http://dx.doi.org/10.1155/2013/810969.
Pełny tekst źródłaVishnoi, Meenakshi, i Seeja K. R. "Privacy Preserving Data Mining using Attribute Encryption and Data Perturbation". INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 6, nr 3 (25.05.2013): 370–78. http://dx.doi.org/10.24297/ijct.v6i3.4461.
Pełny tekst źródłaLian, Huijie, Qingxian Wang i Guangbo Wang. "Large Universe Ciphertext-Policy Attribute-Based Encryption with Attribute Level User Revocation in Cloud Storage". International Arab Journal of Information Technology 17, nr 1 (1.01.2019): 107–17. http://dx.doi.org/10.34028/iajit/17/1/13.
Pełny tekst źródłaLiu, Zichun, Liusheng Huang, Hongli Xu i Wei Yang. "Locally Differentially Private Heterogeneous Graph Aggregation with Utility Optimization". Entropy 25, nr 1 (9.01.2023): 130. http://dx.doi.org/10.3390/e25010130.
Pełny tekst źródłaFan, Meng, i Jinping Dai. "Monetary attribute of stablecoins: A theoretical and empirical test". National Accounting Review 5, nr 3 (2023): 261–81. http://dx.doi.org/10.3934/nar.2023016.
Pełny tekst źródłaQaosar, Mahboob, Asif Zaman, Md Siddique, Annisa i Yasuhiko Morimoto. "Privacy-Preserving Secure Computation of Skyline Query in Distributed Multi-Party Databases". Information 10, nr 3 (25.03.2019): 119. http://dx.doi.org/10.3390/info10030119.
Pełny tekst źródłaSaranya, K., i K. Premalatha. "Private Frequent Item Set Mining in Smart Splitting for Privacy Preserving using Attribute Probability Matrix". Asian Journal of Research in Social Sciences and Humanities 6, nr 10 (2016): 2265. http://dx.doi.org/10.5958/2249-7315.2016.01167.9.
Pełny tekst źródłaKumar, G. Sravan. "Efficient Data Access Control for Cloud Computing With Large Universe and Traceable Attribute-Based Encryption". International Journal of Fuzzy System Applications 9, nr 4 (październik 2020): 61–81. http://dx.doi.org/10.4018/ijfsa.2020100103.
Pełny tekst źródłaLiu, Jie, Guangli Xiang, Chengde Li i Weiping Xie. "Traceable Attribute-Based Encryption Scheme Using BIM Collaborative Design". Buildings 14, nr 3 (8.03.2024): 731. http://dx.doi.org/10.3390/buildings14030731.
Pełny tekst źródłaHe, Qingsu, Yu Xu, Zhoubin Liu, Jinhong He, You Sun i Rui Zhang. "A privacy-preserving Internet of Things device management scheme based on blockchain". International Journal of Distributed Sensor Networks 14, nr 11 (listopad 2018): 155014771880875. http://dx.doi.org/10.1177/1550147718808750.
Pełny tekst źródłaLevy, Sheldon G. "Peace Science: A Multiple Attribute Approach". Peace Economics, Peace Science and Public Policy 20, nr 3 (1.08.2014): 429–40. http://dx.doi.org/10.1515/peps-2014-0013.
Pełny tekst źródłaSingaravelan, Shanmugasundaram, Ramaiah Arun, Dhiraviyam Arun Shunmugam, Raja Veeman Vivek i Dhanushkodi Murugan. "Access control scheme in cloud services based on different user roles". Informatologia 51, nr 3-4 (30.12.2018): 182–88. http://dx.doi.org/10.32914/i.51.3-4.6.
Pełny tekst źródłaBakar, Nurul Qistina Binti Abu. "MORAL LEADERSHIP AMONG HEADS OF DEPARTMENTS AT SELECTED PRIVATE INSTITUTIONS IN KLANG VALLEY". Educational Administration Research and Review 1, nr 2 (29.11.2019): 52–61. http://dx.doi.org/10.17509/earr.v1i2.21417.
Pełny tekst źródłaWang, Guangbo, i Jianhua Wang. "Research on Ciphertext-Policy Attribute-Based Encryption with Attribute Level User Revocation in Cloud Storage". Mathematical Problems in Engineering 2017 (2017): 1–12. http://dx.doi.org/10.1155/2017/4070616.
Pełny tekst źródła