76   Artículos

 
en línea
Jun Li, Chenyang Zhang, Jianyi Zhang and Yanhua Shao    
To address the challenge of balancing privacy protection with regulatory oversight in blockchain transactions, we propose a regulatable privacy protection scheme for blockchain transactions. Our scheme utilizes probabilistic public-key encryption to obsc... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Jiawei Han, Qingsa Li, Ying Xu, Yan Zhu and Bingxin Wu    
Artificial intelligence-generated content (AIGC) technology has had disruptive results in AI, representing a new trend in research and application and promoting a new era of AI. The potential benefits of this technology are both profound and diverse. How... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Nigang Sun, Chenyang Zhu, Yuanyi Zhang and Yining Liu    
Digital transformation of the logistics industry triggered by the widespread use of Internet of Things (IoT) technology has prompted a significant revolution in logistics companies, further bringing huge dividends to society. However, the concurrent acce... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Vasiliki Demertzi, Stavros Demertzis and Konstantinos Demertzis    
The rapid advancements in technology have given rise to groundbreaking solutions and practical applications in the field of the Industrial Internet of Things (IIoT). These advancements have had a profound impact on the structures of numerous industrial o... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Bithin Alangot, Pawel Szalachowski, Tien Tuan Anh Dinh, Souhail Meftah, Jeff Ivanos Gana, Khin Mi Mi Aung and Zengpeng Li    
Decentralized identity (DID) systems aim to give users full control over their identities by using completely decentralized technologies, such as blockchain or distributed ledgers, as identity providers. However, when user credentials are compromised, it... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Dominik Molitor, Wullianallur Raghupathi, Aditya Saharia and Viju Raghupathi    
While data breaches are a frequent and universal phenomenon, the characteristics and dimensions of data breaches are unexplored. In this novel exploratory research, we apply machine learning (ML) and text analytics to a comprehensive collection of data b... ver más
Revista: Information    Formato: Electrónico

 
en línea
Tim Friedhoff, Cam-Duc Au, Nadine Ladnar, Dirk Stein and Alexander Zureck    
According to a study by the German Federal Printing Office (2022), every European lives with 90 digital identities on average, and the trend is rising. The German government has launched the innovation competition ?Digital Identities Showcase? to select ... ver más
Revista: Computers    Formato: Electrónico

 
en línea
Yuanzhe Yang, Zhiyi Niu, Yuying Qiu, Biao Song, Xinchang Zhang and Yuan Tian    
The widespread application of multimedia technologies such as video surveillance, online meetings, and drones facilitates the acquisition of a large amount of data that may contain facial features, posing significant concerns with regard to privacy. Prot... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Nahla El-Haggar, Lobna Amouri, Albandari Alsumayt, Fatemah H. Alghamedy and Sumayh S. Aljameel    
The progress made in Information and Communication Technologies (ICT) has played a crucial role in turning the Internet of Things (IoT) into a reality. IoT is an emerging technology that refers to networks of interconnected and Internet-enabled objects e... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Karl van der Schyff, Greg Foster, Karen Renaud and Stephen Flowerday    
Online users are responsible for protecting their online privacy themselves: the mantra is custodiat te (protect yourself). Even so, there is a great deal of evidence pointing to the fact that online users generally do not act to preserve the privacy of ... ver más
Revista: Future Internet    Formato: Electrónico

« Anterior     Página: 1 de 5     Siguiente »