Статті в журналах з теми "Security of private data"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Security of private data".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Kapil, Gayatri, Alka Agrawal, and R. A. Khan. "Big Data Security and Privacy Issues." Asian Journal of Computer Science and Technology 7, no. 2 (August 5, 2018): 128–32. http://dx.doi.org/10.51983/ajcst-2018.7.2.1861.
Повний текст джерелаAlqadi, Ziad, and Mohammad S. Khrisat. "DATA STEGANOGRAPHY USING EMBEDDED PRIVATE KEY." International Journal of Engineering Technologies and Management Research 7, no. 9 (September 21, 2020): 31–38. http://dx.doi.org/10.29121/ijetmr.v7.i9.2020.782.
Повний текст джерелаHussain, Md Equebal, and Mohammad Rashid Hussain. "Securing Cloud Data using RSA Algorithm." International Journal of Recent Contributions from Engineering, Science & IT (iJES) 6, no. 4 (December 19, 2018): 96. http://dx.doi.org/10.3991/ijes.v6i4.9910.
Повний текст джерелаSrinivasu, N., Masood Sahil, Jeevan Francis, and Sure Pravallika. "Security enhanced using honey encryption for private data sharing in cloud." International Journal of Engineering & Technology 7, no. 1.1 (December 21, 2017): 675. http://dx.doi.org/10.14419/ijet.v7i1.1.10826.
Повний текст джерелаGatkal, Suyog, Vinayak Dhage, Dhanashree Kalekar, and Sanket Ghadge. "Survey on Medical Data Storage Systems." International Journal of Soft Computing and Engineering 11, no. 1 (September 30, 2021): 44–48. http://dx.doi.org/10.35940/ijsce.a3528.0911121.
Повний текст джерелаDeb, Nabamita, Mohamed A. Elashiri, T. Veeramakali, Abdul Wahab Rahmani, and Sheshang Degadwala. "A Metaheuristic Approach for Encrypting Blockchain Data Attributes Using Ciphertext Policy Technique." Mathematical Problems in Engineering 2022 (February 10, 2022): 1–10. http://dx.doi.org/10.1155/2022/7579961.
Повний текст джерелаAvant, Deborah, and Kara Kingma Neu. "The Private Security Events Database." Journal of Conflict Resolution 63, no. 8 (January 30, 2019): 1986–2006. http://dx.doi.org/10.1177/0022002718824394.
Повний текст джерелаCoutu, Sylvain, Inbal Becker-Reshef, Alyssa K. Whitcraft, and Chris Justice. "Food security: underpin with public and private data sharing." Nature 578, no. 7796 (February 2020): 515. http://dx.doi.org/10.1038/d41586-020-00241-y.
Повний текст джерелаHennessy, S. D., G. D. Lauer, N. Zunic, B. Gerber, and A. C. Nelson. "Data-centric security: Integrating data privacy and data security." IBM Journal of Research and Development 53, no. 2 (March 2009): 2:1–2:12. http://dx.doi.org/10.1147/jrd.2009.5429044.
Повний текст джерелаPark, Young-Hoon, Yejin Kim, and Junho Shim. "Blockchain-Based Privacy-Preserving System for Genomic Data Management Using Local Differential Privacy." Electronics 10, no. 23 (December 3, 2021): 3019. http://dx.doi.org/10.3390/electronics10233019.
Повний текст джерелаAgarwal, Archita, Maurice Herlihy, Seny Kamara, and Tarik Moataz. "Encrypted Databases for Differential Privacy." Proceedings on Privacy Enhancing Technologies 2019, no. 3 (July 1, 2019): 170–90. http://dx.doi.org/10.2478/popets-2019-0042.
Повний текст джерелаSood, Sandeep K. "Hybrid Data Security Model for Cloud." International Journal of Cloud Applications and Computing 3, no. 3 (July 2013): 50–59. http://dx.doi.org/10.4018/ijcac.2013070104.
Повний текст джерелаCarrillo, Eduardo, and Maricarmen Sequera. "PERSONAL DATA IN THE SOCIAL SECURITY INSTITUTE." Law, State and Telecommunications Review 12, no. 2 (October 13, 2020): 14–37. http://dx.doi.org/10.26512/lstr.v12i2.34689.
Повний текст джерелаTian, Jun-Feng, and Hao-Ning Wang. "An efficient and secure data auditing scheme based on fog-to-cloud computing for Internet of things scenarios." International Journal of Distributed Sensor Networks 16, no. 5 (May 2020): 155014772091662. http://dx.doi.org/10.1177/1550147720916623.
Повний текст джерелаBeardsley, Bob. "Private Security: Enigma and Overlooked Resource." Journal of Contemporary Criminal Justice 3, no. 4 (December 1987): 44–51. http://dx.doi.org/10.1177/104398628700300404.
Повний текст джерелаYovine, Sergio, Franz Mayr, Sebastián Sosa, and Ramiro Visca. "An Assessment of the Application of Private Aggregation of Ensemble Models to Sensible Data." Machine Learning and Knowledge Extraction 3, no. 4 (September 25, 2021): 788–801. http://dx.doi.org/10.3390/make3040039.
Повний текст джерелаC P, SHANTALA, and K. V. Viswanatha. "Secure SDN Framework for Data Exfiltration via Video Steganography." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 14, no. 9 (June 22, 2015): 6067–73. http://dx.doi.org/10.24297/ijct.v14i9.1847.
Повний текст джерелаGuo, Hong Liang, and He Long Yu. "Position Mobil Information Encryption Algorithm Based on Key Attributes of Reduced Rank Agent under Cloud Storage." Advanced Materials Research 989-994 (July 2014): 2008–11. http://dx.doi.org/10.4028/www.scientific.net/amr.989-994.2008.
Повний текст джерелаSatya Sai Kumar, Avula, S. Mohan, and R. Arunkumar. "A Survey on Security Models for Data Privacy in Big Data Analytics." Asian Journal of Computer Science and Technology 7, S1 (November 5, 2018): 87–89. http://dx.doi.org/10.51983/ajcst-2018.7.s1.1798.
Повний текст джерелаAbd, Mohammad Hasan. "Dynamic Data Replication for Higher Availability and Security." Wasit Journal of Computer and Mathematics Science 1, no. 1 (March 17, 2021): 31–42. http://dx.doi.org/10.31185/wjcm.vol1.iss1.6.
Повний текст джерелаKaraçay, Leyli, Erkay Savaş, and Halit Alptekin. "Intrusion Detection Over Encrypted Network Data." Computer Journal 63, no. 4 (November 17, 2019): 604–19. http://dx.doi.org/10.1093/comjnl/bxz111.
Повний текст джерелаShen, Qingni, Yahui Yang, Zhonghai Wu, Dandan Wang, and Min Long. "Securing data services: a security architecture design for private storage cloud based on HDFS." International Journal of Grid and Utility Computing 4, no. 4 (2013): 242. http://dx.doi.org/10.1504/ijguc.2013.057118.
Повний текст джерелаKasthuri, Magesh. "Blockchain based Data Security as a Service in Cloud Platform Security." International Journal on Cloud Computing: Services and Architecture 11, no. 6 (December 31, 2021): 1–8. http://dx.doi.org/10.5121/ijccsa.2021.11601.
Повний текст джерелаSun, Jianglin, Xiaofeng Liao, Xin Chen, and Shangwei Guo. "Privacy-Aware Image Encryption Based on Logistic Map and Data Hiding." International Journal of Bifurcation and Chaos 27, no. 05 (May 2017): 1750073. http://dx.doi.org/10.1142/s0218127417500730.
Повний текст джерелаKasza, Péter, Péter Ligeti, and Ádám Nagy. "Siren: Secure data sharing over P2P and F2F networks." Studia Scientiarum Mathematicarum Hungarica 52, no. 2 (June 2015): 257–64. http://dx.doi.org/10.1556/012.2015.52.2.1316.
Повний текст джерелаJawdhari, Hayder A., and Alharith A. Abdullah. "A New Environment of Blockchain based Multi Encryption Data Transferring." Webology 18, no. 2 (December 30, 2021): 1379–91. http://dx.doi.org/10.14704/web/v18i2/web18396.
Повний текст джерелаR. Sneberger, Michael. "Reconciling Competing Data Security Standards Applicable to Data Held by Retail Banks Operating in California in Light of Van Buren and TransUnion." Global Privacy Law Review 2, Issue 3 (October 1, 2021): 174–85. http://dx.doi.org/10.54648/gplr2021023.
Повний текст джерелаRath, Annanda, Bojan Spasic, Nick Boucart, and Philippe Thiran. "Security Pattern for Cloud SaaS: From System and Data Security to Privacy Case Study in AWS and Azure." Computers 8, no. 2 (May 3, 2019): 34. http://dx.doi.org/10.3390/computers8020034.
Повний текст джерелаYakhtin, Vasily. "National Information Risks of Big Data." Vestnik Volgogradskogo gosudarstvennogo universiteta. Ekonomika, no. 3 (November 2021): 16–25. http://dx.doi.org/10.15688/ek.jvolsu.2021.3.2.
Повний текст джерелаCorones, Stephen, and Juliet Davis. "Protecting Consumer Privacy and Data Security: Regulatory Challenges and Potential Future Directions." Federal Law Review 45, no. 1 (March 2017): 65–95. http://dx.doi.org/10.1177/0067205x1704500104.
Повний текст джерелаFroelicher, David, Patricia Egger, João Sá Sousa, Jean Louis Raisaro, Zhicong Huang, Christian Mouchet, Bryan Ford, and Jean-Pierre Hubaux. "UnLynx: A Decentralized System for Privacy-Conscious Data Sharing." Proceedings on Privacy Enhancing Technologies 2017, no. 4 (October 1, 2017): 232–50. http://dx.doi.org/10.1515/popets-2017-0047.
Повний текст джерелаMaryanto, Maryanto, Maisyaroh Maisyaroh, and Budi Santoso. "Metode Internet Protocol Security (IPSec) Dengan Virtual Private Network (VPN) Untuk Komunikasi Data." PIKSEL : Penelitian Ilmu Komputer Sistem Embedded and Logic 6, no. 2 (September 18, 2018): 179–88. http://dx.doi.org/10.33558/piksel.v6i2.1508.
Повний текст джерелаBenmalek, Mourad, Mohamed Ali Benrekia, and Yacine Challal. "Security of Federated Learning: Attacks, Defensive Mechanisms, and Challenges." Revue d'Intelligence Artificielle 36, no. 1 (February 28, 2022): 49–59. http://dx.doi.org/10.18280/ria.360106.
Повний текст джерелаSuleiman, James, and Terry Huston. "Data Privacy and Security." International Journal of Information Security and Privacy 3, no. 2 (April 2009): 42–53. http://dx.doi.org/10.4018/jisp.2009040103.
Повний текст джерелаGaff, Brian M., Thomas J. Smedinghoff, and Socheth Sor. "Privacy and Data Security." Computer 45, no. 3 (March 2012): 8–10. http://dx.doi.org/10.1109/mc.2012.102.
Повний текст джерелаAdam, J. A. "Data security-cryptography=privacy?" IEEE Spectrum 29, no. 8 (August 1992): 29–35. http://dx.doi.org/10.1109/6.144533.
Повний текст джерелаHuang, Qinlong, Licheng Wang, and Yixian Yang. "Secure and Privacy-Preserving Data Sharing and Collaboration in Mobile Healthcare Social Networks of Smart Cities." Security and Communication Networks 2017 (2017): 1–12. http://dx.doi.org/10.1155/2017/6426495.
Повний текст джерелаEL Azzaoui, Abir, Haotian Chen, So Hyeon Kim, Yi Pan, and Jong Hyuk Park. "Blockchain-Based Distributed Information Hiding Framework for Data Privacy Preserving in Medical Supply Chain Systems." Sensors 22, no. 4 (February 10, 2022): 1371. http://dx.doi.org/10.3390/s22041371.
Повний текст джерелаSingh, Ajit, and Rimple Gilhotra. "Data Security Using Private Key Encryption System Based on Arithmetic Coding." International Journal of Network Security & Its Applications 3, no. 3 (May 31, 2011): 58–67. http://dx.doi.org/10.5121/ijnsa.2011.3305.
Повний текст джерелаWang, Huiyong, Mingjun Luo, and Yong Ding. "Privacy-Preserving Fingerprint Authentication Using D-H Key Exchange and Secret Sharing." Security and Communication Networks 2021 (November 27, 2021): 1–12. http://dx.doi.org/10.1155/2021/5344696.
Повний текст джерелаGeorge, Jomin, and Takura Bhila. "Security, Confidentiality and Privacy in Health of Healthcare Data." International Journal of Trend in Scientific Research and Development Volume-3, Issue-4 (June 30, 2019): 373–77. http://dx.doi.org/10.31142/ijtsrd23780.
Повний текст джерелаKumar.R, Dr Prasanna, Porselvan G, Prem Kumar S, and Robinlash F. "Security and Privacy Based Data Sharing in Cloud Computing." International Journal of Innovative Research in Engineering & Management 5, no. 1 (January 2018): 42–49. http://dx.doi.org/10.21276/ijirem.2018.5.1.9.
Повний текст джерелаV, Suma. "SECURITY AND PRIVACY MECHANISM USING BLOCKCHAIN." Journal of Ubiquitous Computing and Communication Technologies 01, no. 01 (September 23, 2019): 45–54. http://dx.doi.org/10.36548/jucct.2019.1.005.
Повний текст джерелаZeng, Wen Ying, and Yue Long Zhao. "Mobile Storage and Data Security Management Research." Applied Mechanics and Materials 325-326 (June 2013): 1661–64. http://dx.doi.org/10.4028/www.scientific.net/amm.325-326.1661.
Повний текст джерелаHelmiawan, Muhammad Agreindra, and Irfan Fadil. "PRIVATE CLOUD STORAGE IN RURAL'S MANAGEMENT AND INFORMATION SYSTEM USING ROADMAP FOR CLOUD COMPUTING ADOPTION (ROCCA)." INTERNAL (Information System Journal) 2, no. 2 (January 30, 2020): 172–83. http://dx.doi.org/10.32627/internal.v2i2.85.
Повний текст джерелаHaughton, Suzette A., Trevor A. Smith, and Joakim Berndtsson. "Consumer Drivers of Industry Growth and Household Loyalty to Private Security Firms in Jamaica." Journal of Contemporary Criminal Justice 36, no. 1 (December 4, 2019): 110–27. http://dx.doi.org/10.1177/1043986219890204.
Повний текст джерелаDiers-Lawson, Audra, and Amelia Symons. "Mind the gap: Understanding stakeholder reactions to different types of data security." Proceedings of the International Crisis and Risk Communication Conference 3 (March 11, 2020): 25–28. http://dx.doi.org/10.30658/icrcc.2020.6.
Повний текст джерелаNoh, Geontae, Ji Young Chun, and Ik Rae Jeong. "Sharing Privacy Protected and Statistically Sound Clinical Research Data Using Outsourced Data Storage." Journal of Applied Mathematics 2014 (2014): 1–12. http://dx.doi.org/10.1155/2014/381361.
Повний текст джерелаLi, Ye, Zoe L. Jiang, Xuan Wang, Junbin Fang, En Zhang, and Xianmin Wang. "Securely Outsourcing ID3 Decision Tree in Cloud Computing." Wireless Communications and Mobile Computing 2018 (October 4, 2018): 1–10. http://dx.doi.org/10.1155/2018/2385150.
Повний текст джерелаPelau, Corina, Mihaela Stanescu, and Daniela Serban. "Big-Data and Consumer Profiles – The hidden traps of data collection on social media networks." Proceedings of the International Conference on Business Excellence 13, no. 1 (May 1, 2019): 1070–78. http://dx.doi.org/10.2478/picbe-2019-0093.
Повний текст джерела