Статті в журналах з теми "Private attribute"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Private attribute".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Lai, Jianchang, Yi Mu, Fuchun Guo, Peng Jiang, and Willy Susilo. "Privacy-enhanced attribute-based private information retrieval." Information Sciences 454-455 (July 2018): 275–91. http://dx.doi.org/10.1016/j.ins.2018.04.084.
Zhang, Hao, Yue Zhao, Jintao Meng, Xue Wang, and Kaijun Wu. "Attribute-Based Encryption Scheme with k-Out-of-n Oblivious Transfer." Electronics 12, no. 21 (November 1, 2023): 4502. http://dx.doi.org/10.3390/electronics12214502.
Battaglia, Elena, Simone Celano, and Ruggero G. Pensa. "Differentially Private Distance Learning in Categorical Data." Data Mining and Knowledge Discovery 35, no. 5 (July 13, 2021): 2050–88. http://dx.doi.org/10.1007/s10618-021-00778-0.
Zhang, Guo Yan. "A Multi-Authority Attribute-Based Encryption System Against Malicious KGC." Advanced Engineering Forum 6-7 (September 2012): 38–44. http://dx.doi.org/10.4028/www.scientific.net/aef.6-7.38.
Rezaeifar, Shideh, Slava Voloshynovskiy, Meisam Asgari Asgari Jirhandeh, and Vitality Kinakh. "Privacy-Preserving Image Template Sharing Using Contrastive Learning." Entropy 24, no. 5 (May 3, 2022): 643. http://dx.doi.org/10.3390/e24050643.
Zhang, Runnan, Gang Liu, Shancang Li, Yongheng Wei, and Quan Wang. "ABSAC: Attribute-Based Access Control Model Supporting Anonymous Access for Smart Cities." Security and Communication Networks 2021 (March 20, 2021): 1–11. http://dx.doi.org/10.1155/2021/5531369.
Pin, Lim Wei, and Manmeet Mahinderjit Singh. "User authentication using gait and enhanced attribute-based encryption: a case of smart home." Bulletin of Electrical Engineering and Informatics 13, no. 3 (June 1, 2024): 1839–46. http://dx.doi.org/10.11591/eei.v13i3.5347.
Han, Fei, and Jing Qin. "A Function Private Attribute-Based Encryption." International Journal of Distributed Sensor Networks 10, no. 1 (January 2014): 749568. http://dx.doi.org/10.1155/2014/749568.
Mosteiro-Sanchez, Aintzane, Marc Barcelo, Jasone Astorga, and Aitor Urbieta. "Trustworthy Users: Using IOTA and IPFS for Attribute Validation in CP-ABE and dCP-ABE Schemes." Smart Cities 6, no. 2 (March 10, 2023): 913–28. http://dx.doi.org/10.3390/smartcities6020044.
Arroyo Arevalo, Caridad, Sayedeh Leila Noorbakhsh, Yun Dong, Yuan Hong, and Binghui Wang. "Task-Agnostic Privacy-Preserving Representation Learning for Federated Learning against Attribute Inference Attacks." Proceedings of the AAAI Conference on Artificial Intelligence 38, no. 10 (March 24, 2024): 10909–17. http://dx.doi.org/10.1609/aaai.v38i10.28965.
Setiawan, Raka Adji, Fauziah Fauziah, and Ratih Titi Komala Sari. "Aplikasi Perbandingan Pemilihan Guru Private Homeschooling menggunakan Algoritma Simple Additive Weighting (SAW) dan Weight Product Berbasis Web." Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) 4, no. 2 (January 1, 2021): 14. http://dx.doi.org/10.35870/jtik.v5i1.195.
Yang, Kunwei, Bo Yang, Yanwei Zhou, Tao Wang, and Linming Gong. "Privacy Protection of Task in Crowdsourcing: Policy-Hiding and Attribute Updating Attribute-Based Access Control Based on Blockchain." Wireless Communications and Mobile Computing 2022 (March 24, 2022): 1–12. http://dx.doi.org/10.1155/2022/7787866.
Nandini, Ryke, Ambar Kusumandari, Totok Gunawan, and Ronggo Sadono. "Multidimensional Scaling Approach to Evaluate the Level of Community Forestry Sustainability in Babak Watershed, Lombok Island, West Nusa Tenggara." Forum Geografi 31, no. 1 (July 1, 2017): 28–42. http://dx.doi.org/10.23917/forgeo.v31i1.3371.
Al Karomi, M. Adib, Much Rifqi Maulana, Slamet Joko Prasetiono, Ivandari Ivandari, and Arochman Arochman. "Strengthening campus finance by analyzing attribute attributes for student registration classifications." JAICT 4, no. 2 (June 26, 2020): 1. http://dx.doi.org/10.32497/jaict.v4i2.1431.
Choi, Daeseon, Younho Lee, Seokhyun Kim, and Pilsung Kang. "Private attribute inference from Facebook’s public text metadata: a case study of Korean users." Industrial Management & Data Systems 117, no. 8 (September 11, 2017): 1687–706. http://dx.doi.org/10.1108/imds-07-2016-0276.
Kumar, G. Sravan, and A. Sri Krishna. "Data Security for Cloud Datasets With Bloom Filters on Ciphertext Policy Attribute Based Encryption." International Journal of Information Security and Privacy 13, no. 4 (October 2019): 12–27. http://dx.doi.org/10.4018/ijisp.2019100102.
Chen, Chuanming, Wenshi Lin, Shuanggui Zhang, Zitong Ye, Qingying Yu, and Yonglong Luo. "Personalized trajectory privacy-preserving method based on sensitive attribute generalization and location perturbation." Intelligent Data Analysis 25, no. 5 (September 15, 2021): 1247–71. http://dx.doi.org/10.3233/ida-205306.
Aryanto, Rudy, Trisnasari, Haryadi Sarjono, and Idris Gautama So. "Customer Interface Preferences to Ecotourism Destination Website." Advanced Materials Research 905 (April 2014): 706–10. http://dx.doi.org/10.4028/www.scientific.net/amr.905.706.
Mandloi, Dheeraj, and Vipul Thakur. "Public-Private Partnership Model as a Potential Attribute to Engineering and Society." International Journal of Scientific Research 2, no. 10 (June 1, 2012): 1–4. http://dx.doi.org/10.15373/22778179/oct2013/39.
Vemou, Konstantina, and Maria Karyda. "Requirements for private communications over public spheres." Information & Computer Security 28, no. 1 (November 11, 2019): 68–96. http://dx.doi.org/10.1108/ics-01-2019-0002.
Deb, Nabamita, Mohamed A. Elashiri, T. Veeramakali, Abdul Wahab Rahmani, and Sheshang Degadwala. "A Metaheuristic Approach for Encrypting Blockchain Data Attributes Using Ciphertext Policy Technique." Mathematical Problems in Engineering 2022 (February 10, 2022): 1–10. http://dx.doi.org/10.1155/2022/7579961.
Suyono, Rudi Sugiono, Nurhayati Nurhayati, and Wisa Yustrinisa. "Mode Selection Sensitivity Analysis between BRT and Private Vehicle (Case Study of Pontianak City CBD Area)." MEDIA KOMUNIKASI TEKNIK SIPIL 27, no. 1 (August 20, 2021): 61–68. http://dx.doi.org/10.14710/mkts.v27i1.29306.
Priya, Aayushi, and Rajeev Tiwari. "A Survey: Attribute Based Encryption for Secure Cloud." IJOSTHE 5, no. 3 (June 1, 2018): 12. http://dx.doi.org/10.24113/ojssports.v5i3.70.
Hou, Yibo. "Children's Right to Personal Information towards Public Law." Frontiers in Sustainable Development 2, no. 9 (September 30, 2022): 44–47. http://dx.doi.org/10.54691/fsd.v2i9.2143.
Atre, Saloni, and Mayank Namdev. "Attribute-Based Homomorphic Encryption based Integrity Auditing for Secure Outsourced Storage in Cloud." SMART MOVES JOURNAL IJOSCIENCE 4, no. 8 (August 5, 2018): 8. http://dx.doi.org/10.24113/ijoscience.v4i8.150.
Yang, Gaoming, Xinxin Ye, Xianjin Fang, Rongshi Wu, and Li Wang. "Associated Attribute-Aware Differentially Private Data Publishing via Microaggregation." IEEE Access 8 (2020): 79158–68. http://dx.doi.org/10.1109/access.2020.2990296.
Frederiksen, Tore Kasper, Julia Hesse, Bertram Poettering, and Patrick Towa. "Attribute-based Single Sign-On: Secure, Private, and Efficient." Proceedings on Privacy Enhancing Technologies 2023, no. 4 (October 2023): 35–65. http://dx.doi.org/10.56553/popets-2023-0097.
Zhang, Xiao Lei, and Yi Tang. "Protecting Encrypted Data against Inference Attacks in Outsourced Databases." Applied Mechanics and Materials 571-572 (June 2014): 621–25. http://dx.doi.org/10.4028/www.scientific.net/amm.571-572.621.
Senthil Kumar, K., and D. Malathi. "A Novel method to represent Access Tree structure by Context Free Grammar with and-or graph in Key Policy based Attribute based Encryption." International Journal of Engineering & Technology 7, no. 4.10 (October 2, 2018): 396. http://dx.doi.org/10.14419/ijet.v7i4.10.20946.
Chan, Eric S. W., and Louisa Lam. "Understanding attributes affecting selection of private kitchens." International Journal of Contemporary Hospitality Management 21, no. 7 (October 2, 2009): 854–75. http://dx.doi.org/10.1108/09596110910985322.
Kulikov, Fedor I. "REVISITING THE MECHANISMS OF FUNCTIONING OF THE ARTISTIC SPACE OF AN OLD EGYPTIAN PRIVATE TOMB." Russian Studies in Culture and Society 7, no. 3 (December 23, 2023): 102–16. http://dx.doi.org/10.12731/2576-9782-2023-3-102-116.
Ramadhan, Aditya, Suryawan Murtiadi, and I. Ketut Budastra. "An Analysis of Consumer Preference to Residential Houses in West Java Province." RESEARCH REVIEW International Journal of Multidisciplinary 8, no. 7 (July 15, 2023): 38–47. http://dx.doi.org/10.31305/rrijm.2023.v08.n07.006.
Yang, Qing, Cheng Wang, Teng Hu, Xue Chen, and Changjun Jiang. "Implicit privacy preservation: a framework based on data generation." Security and Safety 1 (2022): 2022008. http://dx.doi.org/10.1051/sands/2022008.
Liu, Chenlei, Feng Xiang, and Zhixin Sun. "Multiauthority Attribute-Based Access Control for Supply Chain Information Sharing in Blockchain." Security and Communication Networks 2022 (April 12, 2022): 1–18. http://dx.doi.org/10.1155/2022/8497628.
Oktaviana, Tifany, Dwi Haryono, and Erlina Rufaidah. "SIKAP DAN KEPUASAN KONSUMEN KOPI BUBUK GUNUNG SEKINCAU DI KECAMATAN SEKINCAU KABUPATEN LAMPUNG BARAT." Jurnal Ilmu-Ilmu Agribisnis 11, no. 1 (February 1, 2023): 9. http://dx.doi.org/10.23960/jiia.v11i1.6127.
Manouselis, Nikos, and Andreas M. Maras. "Multi-attribute Services Brokering in Agent-based Virtual Private Networks." Computing Letters 1, no. 3 (March 6, 2005): 137–43. http://dx.doi.org/10.1163/1574040054861230.
Wang, Changji, and Jianfa Luo. "An Efficient Key-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length." Mathematical Problems in Engineering 2013 (2013): 1–7. http://dx.doi.org/10.1155/2013/810969.
Vishnoi, Meenakshi, and Seeja K. R. "Privacy Preserving Data Mining using Attribute Encryption and Data Perturbation." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 6, no. 3 (May 25, 2013): 370–78. http://dx.doi.org/10.24297/ijct.v6i3.4461.
Lian, Huijie, Qingxian Wang, and Guangbo Wang. "Large Universe Ciphertext-Policy Attribute-Based Encryption with Attribute Level User Revocation in Cloud Storage." International Arab Journal of Information Technology 17, no. 1 (January 1, 2019): 107–17. http://dx.doi.org/10.34028/iajit/17/1/13.
Liu, Zichun, Liusheng Huang, Hongli Xu, and Wei Yang. "Locally Differentially Private Heterogeneous Graph Aggregation with Utility Optimization." Entropy 25, no. 1 (January 9, 2023): 130. http://dx.doi.org/10.3390/e25010130.
Fan, Meng, and Jinping Dai. "Monetary attribute of stablecoins: A theoretical and empirical test." National Accounting Review 5, no. 3 (2023): 261–81. http://dx.doi.org/10.3934/nar.2023016.
Qaosar, Mahboob, Asif Zaman, Md Siddique, Annisa, and Yasuhiko Morimoto. "Privacy-Preserving Secure Computation of Skyline Query in Distributed Multi-Party Databases." Information 10, no. 3 (March 25, 2019): 119. http://dx.doi.org/10.3390/info10030119.
Saranya, K., and K. Premalatha. "Private Frequent Item Set Mining in Smart Splitting for Privacy Preserving using Attribute Probability Matrix." Asian Journal of Research in Social Sciences and Humanities 6, no. 10 (2016): 2265. http://dx.doi.org/10.5958/2249-7315.2016.01167.9.
Kumar, G. Sravan. "Efficient Data Access Control for Cloud Computing With Large Universe and Traceable Attribute-Based Encryption." International Journal of Fuzzy System Applications 9, no. 4 (October 2020): 61–81. http://dx.doi.org/10.4018/ijfsa.2020100103.
Liu, Jie, Guangli Xiang, Chengde Li, and Weiping Xie. "Traceable Attribute-Based Encryption Scheme Using BIM Collaborative Design." Buildings 14, no. 3 (March 8, 2024): 731. http://dx.doi.org/10.3390/buildings14030731.
He, Qingsu, Yu Xu, Zhoubin Liu, Jinhong He, You Sun, and Rui Zhang. "A privacy-preserving Internet of Things device management scheme based on blockchain." International Journal of Distributed Sensor Networks 14, no. 11 (November 2018): 155014771880875. http://dx.doi.org/10.1177/1550147718808750.
Levy, Sheldon G. "Peace Science: A Multiple Attribute Approach." Peace Economics, Peace Science and Public Policy 20, no. 3 (August 1, 2014): 429–40. http://dx.doi.org/10.1515/peps-2014-0013.
Singaravelan, Shanmugasundaram, Ramaiah Arun, Dhiraviyam Arun Shunmugam, Raja Veeman Vivek, and Dhanushkodi Murugan. "Access control scheme in cloud services based on different user roles." Informatologia 51, no. 3-4 (December 30, 2018): 182–88. http://dx.doi.org/10.32914/i.51.3-4.6.
Bakar, Nurul Qistina Binti Abu. "MORAL LEADERSHIP AMONG HEADS OF DEPARTMENTS AT SELECTED PRIVATE INSTITUTIONS IN KLANG VALLEY." Educational Administration Research and Review 1, no. 2 (November 29, 2019): 52–61. http://dx.doi.org/10.17509/earr.v1i2.21417.
Wang, Guangbo, and Jianhua Wang. "Research on Ciphertext-Policy Attribute-Based Encryption with Attribute Level User Revocation in Cloud Storage." Mathematical Problems in Engineering 2017 (2017): 1–12. http://dx.doi.org/10.1155/2017/4070616.