ARTICLES

Filter  
Active filters 0
Remove
  

Refine your searches by:

Collections
Technology
Education
Social Sciences
Law
Architecture and Urbanism
Computing
Computing
Research
Religion
Communication
all records (73)

Languages
English
Spanish
Portuguese
German

Countries
Indonesia
USA
Brazil
Canada
Ukraine
Spain
South Africa
United Kingdom
Italy
Switzerland
all records (77)

Years
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
all records (24)

Filter  
 
3.766  Articles
1 of 378 pages  |  10  records  |  more records»
The data aggregation is a widely used mechanism in Wireless Sensor Networks (WSNs) to increase lifetime of a sensor node, send robust information by avoiding redundant data transmission to the base station. The privacy preserving data aggregation is a cha... see more

When cloud clients outsource their database to the cloud, they entrust management operations to a cloud service provider who is expected to answer the client’s queries on the cloud where database is located. Efficient techniques can ensure critical requir... see more

Sharing medical data can improve the quality of medical services and reduce costs. However, the current Electronic Medical Records (EMRs) are scattered and easily tampered with, which is not conducive to the sharing of EMRs and is not compatible with thin... see more

With the fast development in services related to localisation, location-based service (LBS) gains more importance amongst all the mobile wireless services. To avail the service in the LBS system, information about the location and identity of the user has... see more

Open Science movement has enabled extensive knowledge sharing by making research publications, software, data and samples available to the society and researchers. The demand for data sharing is increasing day by day due to the tremendous knowledge h... see more

This paper presents a high level view of how clusters are being used in large number of domains for preserving and protecting the data. Because of these , clusters are being exposed to many attacks coming from open network.. Hence there are many methods t... see more

Trajectory data contains rich spatio-temporal information of moving objects. Directly publishing it for mining and analysis will result in severe privacy disclosure problems. Most existing clustering-anonymity methods cluster trajectories according to eit... see more

One of the obstacles in using data mining techniques such as association rules is the risk of leakage of sensitive data after the data is released to the public. Therefore, a trade-off between the data privacy and data mining is of a great importance and ... see more

In this digital era, security has become one of the important topics of concern, and things become more critical for military vehicles where safety plays a vital role. In this paper, we have discussed a pseudonym-based approach that preserves the real ide... see more

1 of 378 pages  |  10  records  |  more records»