95   Artículos

 
en línea
Xingchen Wang and Peng Li    
With the widespread adoption of cloud computing, the face verification process often requires the client to upload the face to an untrusted cloud server to obtain the verification results. Privacy leakage issues may arise if the client?s private informat... ver más
Revista: Information    Formato: Electrónico

 
en línea
Shunfang Hu, Shaoping Jiang, Qing Miao, Fan Yang, Weihong Zhou and Peng Duan    
With the rise of the Internet of Things (IoT), maintaining data confidentiality and protecting user privacy have become increasingly challenging. End devices in the IoT are often deployed in unattended environments and connected to open networks, making ... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Rabia Khan, Amjad Mehmood, Zeeshan Iqbal, Carsten Maple and Gregory Epiphaniou    
Security has been the most widely researched topic, particularly within IoT, and has been considered as the major hurdle in the adoption of different applications of IoT. When it comes to IoV, security is considered as the most inevitable component to en... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Tiffany Tien Nee Pragasam, John Victor Joshua Thomas, Maria Anu Vensuslaus and Subhashini Radhakrishnan    
Cryptocurrencies are rapidly growing and are increasingly accepted by major commercial vendors. However, along with their rising popularity, they have also become the go-to currency for illicit activities driven by the anonymity they provide. Cryptocurre... ver más
Revista: Computation    Formato: Electrónico

 
en línea
Yongli Tang, Deng Pan, Panke Qin and Liping Lv    
Federal learning and privacy protection are inseparable. The participants in federated learning need to be the targets of privacy protection. On the other hand, federated learning can also be used as a tool for privacy attacks. Group signature is regarde... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Donia Gamal, Marco Alfonse, Salud María Jiménez-Zafra and Mostafa Aref    
Sentiment Analysis, also known as opinion mining, is the area of Natural Language Processing that aims to extract human perceptions, thoughts, and beliefs from unstructured textual content. It has become a useful, attractive, and challenging research are... ver más
Revista: Big Data and Cognitive Computing    Formato: Electrónico

 
en línea
Todd Dobbs, Abdullah-Al-Raihan Nayeem, Isaac Cho and Zbigniew Ras    
Art authentication is the process of identifying the artist who created a piece of artwork and is manifested through events of provenance, such as art gallery exhibitions and financial transactions. Art authentication has visual influence via the uniquen... ver más
Revista: Big Data and Cognitive Computing    Formato: Electrónico

 
en línea
Ioanna Anastasaki, George Drosatos, George Pavlidis and Konstantinos Rantos    
Immersive technologies are revolutionary technological advancements that offer users unparalleled experiences of immersion in a virtual or mixed world of virtual and real elements. In such technology, user privacy, security, and anonymity are paramount, ... ver más
Revista: Information    Formato: Electrónico

 
en línea
Nuwan Weerasinghe, Muhammad Arslan Usman, Chaminda Hewage, Eckhard Pfluegel and Christos Politis    
Implementing 5G-enabled Vehicle-to-Everything (V2X) intelligent transportation systems presents a promising opportunity to enhance road safety and traffic flow while facilitating the integration of artificial intelligence (AI) based solutions. Yet, secur... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Muntadher Sallal, Ruairí de Fréin and Ali Malik    
Privacy and verifiability are crucial security requirements in e-voting systems and combining them is considered to be a challenge given that they seem to be contradictory. On one hand, privacy means that cast votes cannot be traced to the corresponding ... ver más
Revista: Future Internet    Formato: Electrónico

« Anterior     Página: 1 de 6     Siguiente »