Статті в журналах з теми "Privacy evaluation"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Privacy evaluation".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Sohail, Syeda Amna, Faiza Allah Bukhsh, and Maurice van Keulen. "Multilevel Privacy Assurance Evaluation of Healthcare Metadata." Applied Sciences 11, no. 22 (November 12, 2021): 10686. http://dx.doi.org/10.3390/app112210686.
Повний текст джерелаvan Aaken, Dominik, and Andreas Ostermaier. "Privacy and Freedom: An Economic (Re-)Evaluation of Privacy." Academy of Management Proceedings 2013, no. 1 (January 2013): 15830. http://dx.doi.org/10.5465/ambpp.2013.131.
Повний текст джерелаvan Aaken, Dominik, Andreas Ostermaier, and Arnold Picot. "Privacy and Freedom: An Economic (Re-)Evaluation of Privacy." Kyklos 67, no. 2 (April 10, 2014): 133–55. http://dx.doi.org/10.1111/kykl.12047.
Повний текст джерелаPetrakos, Nikolaos, Stefanos Monachos, Emmanouil Magkos, and Panayiotis Kotzanikolaou. "Design and Implementation of an Anonymous and Secure Online Evaluation Protocol." Electronics 9, no. 9 (September 1, 2020): 1415. http://dx.doi.org/10.3390/electronics9091415.
Повний текст джерелаMamakou, Xenia J., Dimitris K. Kardaras, and Eleutherios A. Papathanassiou. "Evaluation of websites’ compliance to legal and ethical guidelines: A fuzzy logic–based methodology." Journal of Information Science 44, no. 4 (March 1, 2017): 425–42. http://dx.doi.org/10.1177/0165551517697610.
Повний текст джерелаCharlesworth, Andrew J. "Privacy, Personal Information and Employment." Surveillance & Society 1, no. 2 (September 1, 2002): 217–22. http://dx.doi.org/10.24908/ss.v1i2.3355.
Повний текст джерелаAsad, Muhammad, Ahmed Moustafa, and Chao Yu. "A Critical Evaluation of Privacy and Security Threats in Federated Learning." Sensors 20, no. 24 (December 15, 2020): 7182. http://dx.doi.org/10.3390/s20247182.
Повний текст джерелаBabaghayou, Messaoud, Nabila Labraoui, and Ado Adamou Abba Ari. "Location-Privacy Evaluation Within the Extreme Points Privacy (EPP) Scheme for VANET Users." International Journal of Strategic Information Technology and Applications 10, no. 2 (April 2019): 44–58. http://dx.doi.org/10.4018/ijsita.2019040103.
Повний текст джерелаAKIYAMA, Ken, Tomofumi HIRAYAMA, Yoshiki NAKAMURA, and Masao INUI. "PRIVACY AND COMMUNICATION IN OFFICE ENVIRONMENT EVALUATION." Journal of Architecture and Planning (Transactions of AIJ) 61, no. 484 (1996): 97–104. http://dx.doi.org/10.3130/aija.61.97_3.
Повний текст джерелаYan, Zheng, Wenxiu Ding, Valtteri Niemi, and Athanasios V. Vasilakos. "Two Schemes of Privacy-Preserving Trust Evaluation." Future Generation Computer Systems 62 (September 2016): 175–89. http://dx.doi.org/10.1016/j.future.2015.11.006.
Повний текст джерелаCottrill, C. D., and P. 'Vonu' Thakuriah. "Privacy in context: an evaluation of policy-based approaches to location privacy protection." International Journal of Law and Information Technology 22, no. 2 (November 26, 2013): 178–207. http://dx.doi.org/10.1093/ijlit/eat014.
Повний текст джерелаSaini, Ikjot, Benjamin St. Amour, and Arunita Jaekel. "Intelligent Adversary Placements for Privacy Evaluation in VANET." Information 11, no. 9 (September 14, 2020): 443. http://dx.doi.org/10.3390/info11090443.
Повний текст джерелаAvizheh, Sepideh, Preston Haffey, and Reihaneh Safavi-Naini. "Privacy-preserving FairSwap: Fairness and privacy interplay." Proceedings on Privacy Enhancing Technologies 2022, no. 1 (November 20, 2021): 417–39. http://dx.doi.org/10.2478/popets-2022-0021.
Повний текст джерелаFestag, Sven, and Cord Spreckelsen. "Privacy-Preserving Deep Learning for the Detection of Protected Health Information in Real-World Data: Comparative Evaluation." JMIR Formative Research 4, no. 5 (May 5, 2020): e14064. http://dx.doi.org/10.2196/14064.
Повний текст джерелаXudong, Yang, Gao Ling, Li Yan, Zhu Hairong, Gao Quanli, Zheng Jie, and Wang Hai. "A Blockchain-Based Location Privacy-Preserving Scheme in Location-Based Service." Mobile Information Systems 2022 (April 6, 2022): 1–16. http://dx.doi.org/10.1155/2022/1931451.
Повний текст джерелаFroelicher, David, Juan R. Troncoso-Pastoriza, Apostolos Pyrgelis, Sinem Sav, Joao Sa Sousa, Jean-Philippe Bossuat, and Jean-Pierre Hubaux. "Scalable Privacy-Preserving Distributed Learning." Proceedings on Privacy Enhancing Technologies 2021, no. 2 (January 29, 2021): 323–47. http://dx.doi.org/10.2478/popets-2021-0030.
Повний текст джерелаRaval, Nisarg, Ashwin Machanavajjhala, and Jerry Pan. "Olympus: Sensor Privacy through Utility Aware Obfuscation." Proceedings on Privacy Enhancing Technologies 2019, no. 1 (January 1, 2019): 5–25. http://dx.doi.org/10.2478/popets-2019-0002.
Повний текст джерелаJones, Michael, Matthew Johnson, Mark Shervey, Joel T. Dudley, and Noah Zimmerman. "Privacy-Preserving Methods for Feature Engineering Using Blockchain: Review, Evaluation, and Proof of Concept." Journal of Medical Internet Research 21, no. 8 (August 14, 2019): e13600. http://dx.doi.org/10.2196/13600.
Повний текст джерелаIsmail, Leila, and Huned Materwala. "Blockchain Paradigm for Healthcare: Performance Evaluation." Symmetry 12, no. 8 (July 22, 2020): 1200. http://dx.doi.org/10.3390/sym12081200.
Повний текст джерелаJunejo, Aisha Zahid, Manzoor Ahmed Hashmani, and Mehak Maqbool Memon. "Empirical Evaluation of Privacy Efficiency in Blockchain Networks: Review and Open Challenges." Applied Sciences 11, no. 15 (July 29, 2021): 7013. http://dx.doi.org/10.3390/app11157013.
Повний текст джерелаWang Rui, Wei Xianglin, Wu Lifa, and He Zhengqiu. "Privacy-aware Trust Evaluation Model for Web Service." INTERNATIONAL JOURNAL ON Advances in Information Sciences and Service Sciences 5, no. 8 (April 30, 2013): 823–22. http://dx.doi.org/10.4156/aiss.vol5.issue8.98.
Повний текст джерелаZhang, Qiujin, Rong Jiang, Tong Li, Zifei Ma, Ming Yang, and Juan Yang. "Cloud Computing Privacy Security Risk Analysis and Evaluation." Recent Patents on Computer Science 11, no. 1 (October 18, 2018): 32–43. http://dx.doi.org/10.2174/2213275911666180719121041.
Повний текст джерелаQiao, Yuncheng, Qiujun Lan, Zhongding Zhou, and Chaoqun Ma. "Privacy-preserving credit evaluation system based on blockchain." Expert Systems with Applications 188 (February 2022): 115989. http://dx.doi.org/10.1016/j.eswa.2021.115989.
Повний текст джерелаArputharaj, Dr Vijay, Mr Mahmud El Yakub, Mr Saheed Tunde, and Mr M. Ponsuresh. "Evaluation On Threats To Privacy In Personal Relationships." International Journal of Advanced Networking and Applications 13, no. 04 (2022): 5089–94. http://dx.doi.org/10.35444/ijana.2022.13412.
Повний текст джерелаZHU, Youwen, and Tsuyoshi TAKAGI. "Efficient Privacy-Preserving Reputation Evaluation in Decentralized Environments." IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E97.A, no. 1 (2014): 409–12. http://dx.doi.org/10.1587/transfun.e97.a.409.
Повний текст джерелаCHEN, Zhenguo, and Liqin TIAN. "Privacy-Preserving Model of IoT Based Trust Evaluation." IEICE Transactions on Information and Systems E100.D, no. 2 (2017): 371–74. http://dx.doi.org/10.1587/transinf.2016edl8185.
Повний текст джерелаGood, Kenneth, and Kenneth Roy. "Open plan privacy index measurement source speaker evaluation." Journal of the Acoustical Society of America 121, no. 5 (May 2007): 3035. http://dx.doi.org/10.1121/1.4781683.
Повний текст джерелаClarke, R. "An evaluation of privacy impact assessment guidance documents." International Data Privacy Law 1, no. 2 (February 15, 2011): 111–20. http://dx.doi.org/10.1093/idpl/ipr002.
Повний текст джерелаGhafarian, Ahmad, and Seyed Amin. "Forensics Evaluation of Privacy of Portable Web Browsers." International Journal of Computer Applications 147, no. 8 (August 16, 2016): 5–11. http://dx.doi.org/10.5120/ijca2016911009.
Повний текст джерелаMarky, Karola, Nina Gerber, Michelle Gabriela Pelzer, Mohamed Khamis, and Max Mühlhäuser. "“You offer privacy like you offer tea”: Investigating Mechanisms for Improving Guest Privacy in IoT-Equipped Households." Proceedings on Privacy Enhancing Technologies 2022, no. 4 (October 2022): 400–420. http://dx.doi.org/10.56553/popets-2022-0115.
Повний текст джерелаYan, Qiben, Jianzhi Lou, Mehmet C. Vuran, and Suat Irmak. "Scalable Privacy-preserving Geo-distance Evaluation for Precision Agriculture IoT Systems." ACM Transactions on Sensor Networks 17, no. 4 (July 22, 2021): 1–30. http://dx.doi.org/10.1145/3463575.
Повний текст джерелаOlacsi, Gary S., Joy Kempic, and Robert J. Beaton. "Image Quality of Privacy Filters for Displays." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 42, no. 22 (October 1998): 1565–69. http://dx.doi.org/10.1177/154193129804202207.
Повний текст джерелаLu, Donghang, Albert Yu, Aniket Kate, and Hemanta Maji. "Polymath: Low-Latency MPC via Secure Polynomial Evaluations and Its Applications." Proceedings on Privacy Enhancing Technologies 2022, no. 1 (November 20, 2021): 396–416. http://dx.doi.org/10.2478/popets-2022-0020.
Повний текст джерелаYousif, Maysa Abubaker, and Aniza Abdul Aziz. "AN EVALUATION OF VISUAL PRIVACY LEVEL IN RESIDENTIAL UNIT'S LAYOUTS IN KHARTOUM, SUDAN." Journal of Islamic Architecture 6, no. 4 (December 26, 2021): 349–59. http://dx.doi.org/10.18860/jia.v6i4.12201.
Повний текст джерелаHong, Tie, SongZhu Mei, ZhiYing Wang, and JiangChun Ren. "A Novel Vertical Fragmentation Method for Privacy Protection Based on Entropy Minimization in a Relational Database." Symmetry 10, no. 11 (November 14, 2018): 637. http://dx.doi.org/10.3390/sym10110637.
Повний текст джерелаSun, Da-Zhi, Li Sun, and Ying Yang. "On Secure Simple Pairing in Bluetooth Standard v5.0-Part II: Privacy Analysis and Enhancement for Low Energy." Sensors 19, no. 15 (July 24, 2019): 3259. http://dx.doi.org/10.3390/s19153259.
Повний текст джерелаGong, Mengchun, Shuang Wang, Lezi Wang, Chao Liu, Jianyang Wang, Qiang Guo, Hao Zheng, Kang Xie, Chenghong Wang, and Zhouguang Hui. "Evaluation of Privacy Risks of Patients’ Data in China: Case Study." JMIR Medical Informatics 8, no. 2 (February 5, 2020): e13046. http://dx.doi.org/10.2196/13046.
Повний текст джерелаMartins, Paulo. "Respect for privacy begins when gathering information." Comunicação e Sociedade 25 (June 30, 2014): 186–201. http://dx.doi.org/10.17231/comsoc.25(2014).1868.
Повний текст джерелаZheng, He, Bo Wu, Heyi Wei, Jinbiao Yan, and Jianfeng Zhu. "A Quantitative Method for Evaluation of Visual Privacy in Residential Environments." Buildings 11, no. 7 (June 26, 2021): 272. http://dx.doi.org/10.3390/buildings11070272.
Повний текст джерелаSanfilippo, Madelyn, Brett Frischmann, and Katherine Standburg. "Privacy as Commons: Case Evaluation Through the Governing Knowledge Commons Framework." Journal of Information Policy 8, no. 1 (March 1, 2018): 116–66. http://dx.doi.org/10.5325/jinfopoli.8.1.0116.
Повний текст джерелаWang, Long. "RFID Tag Anti-Collision Security Study and Evaluation." Applied Mechanics and Materials 752-753 (April 2015): 1250–56. http://dx.doi.org/10.4028/www.scientific.net/amm.752-753.1250.
Повний текст джерелаBagdasaryan, Eugene, Peter Kairouz, Stefan Mellem, Adrià Gascón, Kallista Bonawitz, Deborah Estrin, and Marco Gruteser. "Towards Sparse Federated Analytics: Location Heatmaps under Distributed Differential Privacy with Secure Aggregation." Proceedings on Privacy Enhancing Technologies 2022, no. 4 (October 2022): 162–82. http://dx.doi.org/10.56553/popets-2022-0104.
Повний текст джерелаBenjumea, Jaime, Jorge Ropero, Octavio Rivera-Romero, Enrique Dorronzoro-Zubiete, and Alejandro Carrasco. "Privacy Assessment in Mobile Health Apps: Scoping Review." JMIR mHealth and uHealth 8, no. 7 (July 2, 2020): e18868. http://dx.doi.org/10.2196/18868.
Повний текст джерелаSheikhalishahi, Mina, Ischa Stork, and Nicola Zannone. "Privacy-preserving policy evaluation in multi-party access control." Journal of Computer Security 29, no. 6 (October 27, 2021): 613–50. http://dx.doi.org/10.3233/jcs-200007.
Повний текст джерелаWang, Jinbao, Ling Tian, Yan Huang, Donghua Yang, and Hong Gao. "Achieving the Optimal k-Anonymity for Content Privacy in Interactive Cyberphysical Systems." Security and Communication Networks 2018 (September 26, 2018): 1–15. http://dx.doi.org/10.1155/2018/7963163.
Повний текст джерелаZimmeck, Sebastian, Peter Story, Daniel Smullen, Abhilasha Ravichander, Ziqi Wang, Joel Reidenberg, N. Cameron Russell, and Norman Sadeh. "MAPS: Scaling Privacy Compliance Analysis to a Million Apps." Proceedings on Privacy Enhancing Technologies 2019, no. 3 (July 1, 2019): 66–86. http://dx.doi.org/10.2478/popets-2019-0037.
Повний текст джерелаZhou, Yang, Hua Shen, and Mingwu Zhang. "A Distributed and Privacy-Preserving Random Forest Evaluation Scheme with Fine Grained Access Control." Symmetry 14, no. 2 (February 19, 2022): 415. http://dx.doi.org/10.3390/sym14020415.
Повний текст джерелаDogruel, Leyla. "Privacy nudges as policy interventions: comparing US and German media users’ evaluation of information privacy nudges." Information, Communication & Society 22, no. 8 (November 13, 2017): 1080–95. http://dx.doi.org/10.1080/1369118x.2017.1403642.
Повний текст джерелаNasiri, Negar, and MohammadReza Keyvanpour. "Classification and Evaluation of Privacy Preserving Data Mining Methods." International Journal of Information & Communication Technology Research 12, no. 3 (September 1, 2020): 27–37. http://dx.doi.org/10.52547/ijict.12.3.27.
Повний текст джерелаBlundo, Carlo, Emiliano De Cristofaro, and Paolo Gasti. "EsPRESSO: Efficient privacy-preserving evaluation of sample set similarity." Journal of Computer Security 22, no. 3 (March 20, 2014): 355–81. http://dx.doi.org/10.3233/jcs-130482.
Повний текст джерела