<< مقالات لاتين فني مهندسي >>
<< بر اساس عنوان >>
1
Privacy in the Cloud
2
Privacy in the Information and Communications Technologies
3
Privacy in the pervasive era: A distributed firewall approach
4
Privacy in the Semantic Web: What Policy Languages Have to Offer
5
Privacy in Two-Laser and Three-Laser Chaos Communications
6
Privacy in VANETs using Changing Pseudonyms - Ideal and Real
7
Privacy in Video Surveillance [In the Spotlight]
8
Privacy in VoIP Networks: A k-Anonymity Approach
9
Privacy in VoIP Networks: Flow Analysis Attacks and Defense
10
Privacy Informatics: A Primer on Defensive Tactics for a Society under Siege
11
Privacy Information Security Classification and Comparison between the Westerner and Chinese
12
Privacy Information Security Classification Study in Internet of Things
13
Privacy Infusion in Ubiquitous Computing
14
Privacy Interests in Prescription Data, Part 2: Patient Privacy
15
Privacy Interests in Prescription Data, Part I: Prescriber Privacy
16
Privacy invasion in business environments
17
Privacy Is Dead: Long Live Surveillance Symmetry
18
Privacy is the issue
19
Privacy Issues and Solutions in Social Network Sites
20
Privacy issues in an insecure world
21
Privacy Issues in Identity Verification
22
Privacy issues in location-aware mobile devices
23
Privacy Issues in Middleware for Service-oriented Applications
24
Privacy issues in publishing cancer-related stories in Cancer Patient Portal
25
Privacy issues in social networking platforms: comparative study of facebook developers platform and opensocial
26
Privacy issues in the ubiquitous information society and law in Japan
27
Privacy issues of a smart space for learning
28
Privacy issues of combining ubiquitous computing and software agent technology in a life-critical environment
29
Privacy issues of smart e-mobility
30
Privacy issues on the Internet
31
Privacy Law Resource for Students and Professionals
32
Privacy Leakage in Access Mode: Revisiting Private RFID Authentication Protocols
33
Privacy leakage in biometric secrecy systems
34
Privacy leakage in two-party group nearest neighbor queries
35
Privacy leakages in Smart Home wireless technologies
36
Privacy leaks in mobile phone internet access
37
Privacy Leaks When You Play Games: A Novel User-Behavior-Based Covert Channel on Smartphones
38
Privacy Loss in Classical Multiagent Planning
39
Privacy Maintenance Collaborative Data Mining - A Practical Approach
40
Privacy Management for Context Transponders
41
Privacy Management for Medical Service Application Using Mobile Phone Collaborated with RFID Reader
42
Privacy Management for Mobile Platforms -- A Review of Concepts and Approaches
43
Privacy Management in a Mobile Setting
44
Privacy Management in Consumer e-Health
45
Privacy Management in e-Commerce Communities
46
Privacy management service contacts as a new business opportunity for operators
47
Privacy management service contacts as business opportunity
48
Privacy management system using social networking
49
Privacy Management, the Law & Business Strategies: A Case for Privacy Driven Design
50
Privacy Measurement for Social Network Actor Model
51
Privacy measures awareness, privacy setting use and information privacy concern with Social Networking Sites
52
Privacy Mechanism for Applications in Cloud Computing
53
Privacy mechanisms supporting the building of trust in e-commerce
54
Privacy metrics in ubiquitous computing applications
55
Privacy Model and Annotation for DaaS
56
Privacy modeling for video data publication
57
Privacy models for protecting personal medical information: A preliminary study
58
Privacy monitoring framework for enhancing transparency in cloud computing
59
Privacy Negotiation using a Mobile Agent
60
Privacy Nightmare: When Baby Monitors Go Bad [Opinion]
61
Privacy Obfuscation with Bloom Filter for Effective Advertisement
62
Privacy of a randomised skip lists-based protocol
63
Privacy of encrypted voice-over-IP
64
Privacy of future air traffic management broadcasts
65
Privacy of general aviation aircraft in the NextGen
66
Privacy of general aviation aircraft in the NextGen
67
Privacy of medical records: from law principles to practice
68
Privacy of smart meter systems with an alternative energy source
69
Privacy of trust in similarity estimation through secure computations
70
Privacy on hypothesis testing in smart grids
71
Privacy on the Web: facts, challenges, and solutions
72
Privacy Ontology Support for E-Commerce
73
Privacy or Utility in Data Collection? A Contract Theoretic Approach
74
Privacy Oriented Attribute Exchange in Shibboleth Using Magic Protocols
75
Privacy Pal: Improving Permission Safety Awareness of Third Party Applications in Online Social Networks
76
Privacy Panel: Usable and Quantifiable Mobile Privacy
77
Privacy Parallel Algorithm for Mining Association Rules and its Application in HRM
78
Privacy Perceptive Wireless Service Game Model
79
Privacy Points as a Method to Support Privacy Impact Assessments
80
Privacy policies change management for smartphones
81
Privacy policy compliance for Web services
82
Privacy policy composition of privacy-aware RBAC model for composite WEB services
83
Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites
84
Privacy policy preference (P3P) in e-commerce: Key for improvement
85
Privacy Policy Preferences Enforced by SPARQL Query Rewriting
86
Privacy Policy Representation in Web-based Healthcare
87
Privacy preservation algorithm in data mining for CRM systems
88
Privacy preservation and content protection in location based queries
89
Privacy preservation and enhanced utility in search log publishing using improved zealous algorithm
90
Privacy Preservation and Protection Scheme over ALARM on Geographical Routing
91
Privacy preservation and public auditing for cloud data using ASS in Multi-cloud
92
Privacy Preservation Approach in Service Ecosystems
93
Privacy Preservation by k-Anonymization of Weighted Social Networks
94
Privacy preservation by k-anonymizing Ngrams of time series
95
Privacy preservation for attribute order sensitive workload in medical data publishing
96
Privacy preservation for data cubes
97
Privacy Preservation for Detecting Malicious Web Sites from Suspicious URLs
98
Privacy preservation for participatory sensing data
99
Privacy preservation for personalised services in smart spaces
100
Privacy Preservation in a Two-Tiered Sensor Network through Correlation Tracking
101
Privacy preservation in context aware systems: Overview and applications
102
Privacy Preservation in Decentralized Online Social Networks
103
Privacy Preservation in E-government
104
Privacy preservation in horizontally partitioned databases using randomized response technique
105
Privacy preservation in k-means clustering by cluster rotation
106
Privacy Preservation in Location-Based Mobile Applications: Research Directions
107
Privacy preservation in Location-Based Services (LBS) through Trusted Computing technology
108
Privacy Preservation in SAT (Single Authentication Through)
109
Privacy Preservation in Streaming Data Collection
110
Privacy Preservation in the Publication of Trajectories
111
Privacy preservation in transaction databases based on anatomy technique
112
Privacy Preservation in Ubiquitous Network
113
Privacy preservation in vertical partitioned medical database in the cloud environments
114
Privacy Preservation Naïve Bayes Classification for a Vertically Distribution Scenario Using Trusted Third Party
115
Privacy preservation schemes for querying wireless sensor networks
116
Privacy Preservation Through Process Views
117
Privacy preservation using Geometric Data perturbation and fragmentation approach in Wireless Sensor Networks
118
Privacy Preservation Using Novel Identity Management Scheme in Cloud Computing
119
Privacy preservation, sharing and collection of patient records using cryptographic techniques for cross-clinical secondary analytics
120
Privacy Preserved Attribute Aggregation to Avoid Correlation of User Activities across Shibboleth SPs
121
Privacy preserved duplicate check using multi-biometric fusion
122
Privacy preserved entrust mechanism in cloud computing environment
123
Privacy Preserved Rule-Based Risk Analysis through Secure Multi-party Computation
124
Privacy Preserving Access Control Policy and Algorithms for Conflicting Problems
125
Privacy Preserving Access Control with Authentication for Securing Data in Clouds
126
Privacy preserving and anonymity in multi sinks wireless sensor networks with master sink
127
Privacy preserving and ownership authentication in ubiquitous computing devices using secure three way authentication
128
Privacy preserving association rule mining
129
Privacy preserving association rule mining by introducing concept of impact factor
130
Privacy preserving association rule mining with scalar product
131
Privacy Preserving Association Rules by Using Greedy Approach
132
Privacy preserving association rules in unsecured distributed environment using cryptography
133
Privacy Preserving Association Rules Mining Based on Data Disturbance and Inquiry Limitation
134
Privacy preserving associative classification on vertically partitioned databases
135
Privacy Preserving Attribute Reduction Based on Rough Set
136
Privacy preserving attribute reduction for horizontally partitioned data
137
Privacy Preserving Attribute Reduction for Vertically Partitioned Data
138
Privacy preserving authentication in VANET for location based services
139
Privacy preserving average consensus
140
Privacy Preserving Back-Propagation Based on BGV on Cloud
141
Privacy Preserving Back-Propagation Neural Network Learning Made Practical with Cloud Computing
142
Privacy preserving based on association rule mining
143
Privacy preserving big histogram aggregation for spatial crowdsensing
144
Privacy Preserving Biometric-Based User Authentication Protocol Using Smart Cards
145
Privacy Preserving Burst Detection of Distributed Time Series Data Using Linear Transforms
146
Privacy preserving business process matching
147
Privacy Preserving C4.5 Algorithm Over Horizontally Partitioned Data
148
Privacy Preserving C4.5 Algorithm over Vertically Distributed Datasets
149
Privacy preserving C4.5 using Gini index
150
Privacy Preserving Calculation of Fisher Criterion Score for Informative Gene Selection
151
Privacy Preserving Classification Algorithm Based on Random Multidimensional Scales
152
Privacy Preserving Classification Algorithm Based Random Diffusion Map
153
Privacy preserving classification by using modified C4.5
154
Privacy Preserving Classification in Two-Dimension Distributed Data
155
Privacy Preserving Classification with Emerging Patterns
156
Privacy preserving cloud computing through piecewise approximation of multivariate functions
157
Privacy preserving cloud data access with multi-authorities
158
Privacy Preserving Cloud-Based Computing Platform (PPCCP) for Using Location Based Services
159
Privacy Preserving Clustering by Cluster Bulging for Information Sustenance
160
Privacy Preserving Clustering by Random Response Method of Geometric Transformation
161
Privacy Preserving Clustering on Horizontally Partitioned Data
162
Privacy preserving clustering over distributed data
163
Privacy Preserving Clustering-A Hybrid Approach
164
Privacy Preserving Collaborative Data Mining
165
Privacy Preserving Collaborative Enforcement of Firewall Policies in Virtual Private Networks
166
Privacy Preserving Collaborative Filtering Using Data Obfuscation
167
Privacy Preserving Collaborative Filtering with k-Anonymity through Microaggregation
168
Privacy preserving collaborative forecasting based on dynamic exponential smoothing
169
Privacy Preserving Collaborative Social Network
170
Privacy Preserving Communication in MANETs
171
Privacy Preserving Computation of Shortest Path in Presence of a Single Convex Polygonal Obstacle
172
Privacy preserving computation of trust-value in wireless sensor networks
173
Privacy Preserving Computations Using Implicit Security
174
Privacy Preserving Confidential Forensic Investigation for Shared or Remote Servers
175
Privacy Preserving Cooperative Clustering Service
176
Privacy preserving crowd monitoring: Counting people without people models or tracking
177
Privacy preserving data aggregating with multiple access channel
178
Privacy Preserving Data Aggregation in Wireless Sensor Networks
179
Privacy Preserving Data Analysis in Mental Health Research
180
Privacy Preserving Data Analytics for Smart Homes
181
Privacy preserving data classification with rotation perturbation
182
Privacy Preserving Data Communication Model
183
Privacy Preserving Data Integration across Autonomous Cloud Services
184
Privacy Preserving Data Mining Algorithms by Data Distortion
185
Privacy preserving Data Mining Algorithms without the use of Secure Computation or Perturbation
186
Privacy preserving data mining approach for extracting fuzzy rules
187
Privacy preserving data mining based on association rule- a survey
188
Privacy preserving data mining for social networks
189
Privacy Preserving Data Mining Techniques: Current Scenario and Future Prospects
190
Privacy preserving data mining techniques-survey
191
Privacy preserving data mining using image slicing and visual cryptography
192
Privacy preserving data mining using visual steganography and encryption
193
Privacy preserving data mining with unidirectional interaction
194
Privacy Preserving Data Processing
195
Privacy Preserving Data Publishing for Recommender System
196
Privacy Preserving Data Sharing With Anonymous ID Assignment
197
Privacy preserving database access through dynamic privacy filters with stable data randomization
198
Privacy Preserving Decision Tree Learning over Vertically Partitioned Data
199
Privacy Preserving Decision Tree Learning Using Unrealized Data Sets
200
Privacy Preserving Decision Tree Mining from Perturbed Data
201
Privacy Preserving Delegated Access Control in Public Clouds
202
Privacy preserving delegated access control in the storage as a service model
203
Privacy preserving delegated word search in the cloud
204
Privacy Preserving Density-Based Outlier Detection
205
Privacy Preserving Detection of Patterns in Event Sequences
206
Privacy preserving disclosure of authenticated energy usage data
207
Privacy preserving distributed beamforming based on homomorphic encryption
208
Privacy Preserving Distributed Learning Clustering of HealthCare Data Using Cryptography Protocols
209
Privacy preserving distributed network outage monitoring
210
Privacy Preserving distributed structure learning of probabilistic graphical models
211
Privacy preserving driving style recognition
212
Privacy Preserving DRM Solution with Content Classification and Superdistribution
213
Privacy preserving efficient digital forensic investigation framework
214
Privacy Preserving EM-Based Clustering
215
Privacy preserving e-negotiation protocols based on secure multi-party computation
216
Privacy preserving evaluation of signal quality with application to ECG analysis
217
Privacy preserving extraction of fuzzy rules from distributed data
218
Privacy preserving extraction of fuzzy rules from distributed data with different attributes
219
Privacy preserving face recognition in encrypted domain
220
Privacy Preserving for Continuous Query in Location Based Services
221
Privacy preserving for human object in video surveillance via visual cryptography
222
Privacy preserving for spatio-temporal data publishing ensuring location diversity using K-anonymity technique
223
Privacy Preserving for Tagging Recommender Systems
224
Privacy Preserving Frequent Pattern Mining on Multi-cloud Environment
225
Privacy preserving fuzzy co-clustering with distributed cooccurrence matrices
226
Privacy Preserving Group Nearest Neighbour Queries in Location-Based Services Using Cryptographic Techniques
227
Privacy Preserving Group Ranking
228
Privacy Preserving GWAS Data Sharing
229
Privacy preserving health data processing
230
Privacy preserving heuristic approach for association rule mining in distributed database
231
Privacy preserving hierarchical content distribution in multiparty multilevel DRM
232
Privacy preserving high utility mining based on genetic algorithms
233
Privacy Preserving ID3 Algorithm over Horizontally Partitioned Data
234
Privacy preserving ID3 using Gini Index over horizontally partitioned data
235
Privacy Preserving Identification: Order Statistics List Decoding Perspective
236
Privacy preserving in data mining - Experimental research on SMEs data
237
Privacy Preserving in Data Mining Using Hybrid Approach
238
Privacy Preserving in eLearning Environment (Case of Modeling Hippocratic Database Structure)
239
Privacy Preserving in Ubiquitous Computing: Challenges & Issues
240
Privacy Preserving Information Dispersal in Social Networks Based on Disposition to Privacy
241
Privacy Preserving Intersection of Neighbor Sets Exploiting Cross Checking Capability in a Peer to Peer Social Network Service
242
Privacy Preserving Joins
243
Privacy Preserving k-Anonymity for Re-publication of Incremental Datasets
244
Privacy preserving K-Medoids clustering
245
Privacy preserving large scale DNA read-mapping in MapReduce framework using FPGAs
246
Privacy Preserving Market Schemes for Mobile Sensing
247
Privacy Preserving Maximum Consensus
248
Privacy Preserving Maximum-Flow Computation in Distributed Graphs
249
Privacy preserving method based on GM(1,1) and its application to data clustering
250
Privacy preserving mining of Association Rules on horizontally and vertically partitioned data: A review paper
251
Privacy Preserving Mobility Control Protocols in Wireless Sensor Networks
252
Privacy preserving model in cloud environment
253
Privacy Preserving Multiagent Probabilistic Reasoning about Ambiguous Contexts: A Case Study
254
Privacy preserving multimedia content identification for cloud based bag-of-feature architectures
255
Privacy Preserving Multiparty Multilevel DRM Architecture
256
Privacy Preserving Multiple Keyword Search for Confidential Investigation of Remote Forensics
257
Privacy Preserving Naïve Bayesian Classifier Based on Transition Probability Matrix
258
Privacy Preserving Nearest Neighbor Search
259
Privacy Preserving Nearest Neighbor Search Based on Topologies in Cellular Networks
260
Privacy preserving node selection: A physical layer approach
261
Privacy Preserving of Associative Classification and Heuristic Approach
262
Privacy preserving of two sixteen-segmented image using visual cryptography
263
Privacy Preserving OLAP over Distributed XML Documents
264
Privacy preserving OLAP: Models, issues, algorithms
265
Privacy preserving on Radio Frequency Identification systems
266
Privacy preserving optics for miniature vision sensors
267
Privacy preserving origin-destination flow measurement in vehicular cyber-physical systems
268
Privacy Preserving Outlier Detection over Vertically Partitioned Data
269
Privacy Preserving Outlier Detection Using Hierarchical Clustering Methods
270
Privacy Preserving Outlier Detection Using Locality Sensitive Hashing
271
Privacy Preserving Path Recommendation for Moving User on Location Based Service
272
Privacy Preserving Pattern Classification
273
Privacy Preserving Pattern Discovery in Distributed Time Series
274
Privacy Preserving Pattern Matching on Remote Encrypted Data
275
Privacy Preserving Personalized Access Control Service at Third Service Provider
276
Privacy Preserving Policy-Based Content Sharing in Public Clouds
277
Privacy Preserving Portable Health Record (P^3HR)
278
Privacy preserving probabilistic inference with Hidden Markov Models
279
Privacy Preserving Problem Solving Scheme
280
Privacy preserving processing of data decision tree based on sample selection and Singular Value Decomposition
281
Privacy preserving processing of high dimensional data classification based on sample selection and Singular Value Decomposition
282
Privacy Preserving Publishing on Multiple Quasi-identifiers
283
Privacy preserving quantitative association rule mining using convex optimization technique
284
Privacy Preserving Query Answering in Peer Data Management Systems
285
Privacy Preserving Query Processing Using Third Parties
286
Privacy Preserving Record Linkage Using Phonetic Codes
287
Privacy Preserving Reputation Inquiry in a Peer-to-Peer Communication Environment
288
Privacy preserving research based on association rule algorithm
289
Privacy preserving research for re-publication multiple sensitive attributes in data
290
Privacy preserving revocation update protocol for Group Signature in cloud
291
Privacy Preserving Risk Assessment of Credit Securities
292
Privacy preserving RSS map generation for a crowdsensing network
293
Privacy Preserving Search Schemes over Encrypted Cloud Data: A Comparative Survey
294
Privacy Preserving Secure Communication Protocol for Vehicular Ad Hoc Networks
295
Privacy Preserving Sequential Pattern Mining Based on Data Perturbation
296
Privacy Preserving Sequential Pattern Mining Based on Secure Multi-party Computation
297
Privacy Preserving Sequential Pattern Mining Based on Secure Two-Party Computation
298
Privacy Preserving Sequential Pattern Mining in Progressive Databases Using Noisy Data
299
Privacy Preserving Set Intersection Protocol Secure against Malicious Behaviors
300
Privacy Preserving Shortest Path Computation in Presence of Convex Polygonal Obstacles
301
Privacy Preserving Similarity Detection for Data Analysis
302
Privacy preserving smart grid Communications by verifiable secret key sharing
303
Privacy Preserving Smart Grid Management in the Cloud
304
Privacy preserving smart metering system based retail level electricity market
305
Privacy Preserving Social Network Publication against Mutual Friend Attacks
306
Privacy preserving social networking through decentralization
307
Privacy Preserving Spatial Outlier Detection
308
Privacy preserving spectral clustering over vertically partitioned data sets
309
Privacy Preserving SQL Queries
310
Privacy Preserving Statistics in the Smart Grid
311
Privacy preserving stereoscopic vision with One-Bit transform
312
Privacy preserving string comparisons based on Levenshtein distance
313
Privacy Preserving String Matching for Cloud Computing
314
Privacy Preserving Support Vector Machine Using Non-linear Kernels on Hadoop Mahout
315
Privacy Preserving Support Vector Machines in Wireless Sensor Networks
316
Privacy preserving system for integrated broadcast-broadband services
317
Privacy preserving system for integrated broadcast-broadband services using attribute-based encryption
318
Privacy Preserving Technique for Set-Based Biometric Authentication Using Reed-Solomon Decoding
319
Privacy Preserving Techniques for Location Based Services in Mobile Networks
320
Privacy preserving techniques for storage privacy attacks: A survey
321
Privacy Preserving Third Party Auditing in Multi Cloud Storage Environment
322
Privacy preserving trust authorization framework using XACML
323
Privacy Preserving Trust Negotiation for Pervasive Healthcare
324
Privacy preserving two-party k-means clustering over vertically partitioned dataset
325
Privacy preserving ubiquitous service provisioning based on Bayesian network conversion
326
Privacy Preserving Vehicle Purchase Marketplace
327
Privacy preserving video surveillance infrastructure with particular regard to modular video analytics
328
Privacy Preserving Web Based Transaction Using E-Smart Cards and Image Authentication
329
Privacy preserving Web-based questionnaire
330
Privacy preserving zero knowledge scheme for biometric authentication
331
Privacy Preserving-Based Recommendation Service Model of Mobile Commerce and Anonimity Algorithm
332
Privacy prevention based on trust model for P2P streaming systems
333
Privacy Principles for Sharing Cyber Security Data
334
Privacy Problems in the Online World
335
Privacy profiling impact of Android mobile applications
336
Privacy promises, access control, and privacy management. Enforcing privacy throughout an enterprise by extending access control
337
Privacy protected content sharing in extended home environment over Content-Centric Networking
338
Privacy Protected Data Forwarding in Human Associated Delay Tolerant Networks
339
Privacy Protected ELF for Private Computing on Public Platforms
340
Privacy protected image denoising with secret shares
341
Privacy protected localization and authentication of georeferenced measurements using Galileo PRS
342
Privacy Protected Query Processing on Spatial Networks
343
Privacy Protected Query Processing with Road Network Embedding
344
Privacy Protected Surveillance Using Secure Visual Object Coding
345
Privacy protecting biometric authentication systems: An overview
346
Privacy Protecting by Multiattribute Clustering in Data-Intensive Service
347
Privacy protecting digital payment system using ID-based blind signatures with anonymity revocation trustees
348
Privacy Protecting in E-business Using Reasoning
349
Privacy protecting visual processing for secure video surveillance
350
Privacy Protection Against Malicious Adversaries in Distributed Information Sharing Systems
351
Privacy Protection against Query Prediction in Location-Based Services
352
Privacy protection against ubiquitous marketing
353
Privacy Protection Among Drivers in Vehicle-to-Vehicle Communication Networks
354
Privacy protection and authentication for medical images with record-based watermarking
355
Privacy Protection based on User-defined Preferences in RFID System
356
Privacy protection beyond encryption for cloud big data
357
Privacy Protection for Life-log Video
358
Privacy Protection for Perceptual Applications on Smartphones
359
Privacy protection for personal data integration and sharing in care coordination services: A case study on wellness cloud
360
Privacy protection for RBAC in service oriented architecture
361
Privacy protection for RFID-based tracking systems
362
Privacy protection for secure mobile RFID service
363
Privacy Protection for Speech Information
364
Privacy protection for user authentication
365
Privacy protection for users of location-based services
366
Privacy protection in anonymous computational grid services
367
Privacy Protection in Biometric-Based Recognition Systems: A marriage between cryptography and signal processing
368
Privacy protection in cloud using identity based group signature
369
Privacy Protection in Context Transfer Protocol
370
Privacy Protection in Dynamic Systems Based on RFID Tags
371
Privacy protection in location-sharing services
372
Privacy Protection in Mobile Agent Based Service Domain
373
Privacy Protection in On-line Shopping for Electronic Documents
374
Privacy Protection in Participatory Sensing Applications Requiring Fine-Grained Locations
375
Privacy Protection in Passive Network Monitoring: An Access Control Approach
376
Privacy Protection in Pervasive Healthcare Monitoring Systems with Active Bundles
377
Privacy Protection in Secure Database Service
378
Privacy Protection in Service Discovery for Large-Scale Distributed Computing Systems
379
Privacy Protection in Sharing Personal Genome Sequencing Data
380
Privacy protection in social media networks a dream that can come true?
381
Privacy Protection in Social Network Data Disclosure Based on Granular Computing
382
Privacy Protection in the 1980s
383
Privacy protection in trust management
384
Privacy Protection in Ubiquitous Computing
385
Privacy Protection in Video Surveillance Systems Using Scalable Video Coding
386
Privacy Protection in Video Surveillance Systems: Analysis of Subband-Adaptive Scrambling in JPEG XR
387
Privacy protection in WiFi-based location estimation
388
Privacy protection issues in social networking sites
389
Privacy Protection Mechanisms for Hybrid Hierarchical Wireless Sensor Networks
390
Privacy Protection Mechanisms for Web Service Technology
391
Privacy Protection Method for Test Score Publishing
392
Privacy Protection Model for Distributed Service System in Converged Network
393
Privacy protection of enterprise information through inference analysis
394
Privacy Protection of Fingerprint Database
395
Privacy protection of fingerprint database using lossless data hiding
396
Privacy Protection of Grid Services in a Collaborative SOA Environment
397
Privacy protection of textual medical documents
398
Privacy protection of user-created content on multicore-based handheld devices
399
Privacy protection on sliding window of data streams
400
Privacy protection on the Internet: the marketplace versus the state
401
Privacy Protection on Transfer System of Automated Teller Machine from Brute Force Attack
402
Privacy protection protocol in pervasive computing
403
Privacy protection scheme in smart grid using rechargeable battery
404
Privacy Protection Technology in Video Surveillance System
405
Privacy Protection: p-Sensitive k-Anonymity Property
406
Privacy quantitative model with multiple decision factors
407
Privacy recovery with disposable email addresses
408
Privacy Reference Monitor - A Computer Model for Law Compliant Privacy Protection
409
Privacy region protection for H.264/AVC by encrypting the intra prediction modes without drift error in I frames
410
Privacy Regulatory Model for the Cloud: A Case Study
411
Privacy requirements for embedded sensor devices
412
Privacy requirements implemented with a JavaCard
413
Privacy Requirements in an Age of Increased Sharing
414
Privacy Requirements in Vehicular Communication Systems
415
Privacy requirements patterns for mobile operating systems
416
Privacy requirements specification for digital identity management systems implementation: Towards a digital society of privacy
417
Privacy Research on Ubicomp Computing with Neural Cryptography
418
Privacy Respected Ubiquitous Sensor Environment
419
Privacy Rights Management for Privacy Compliance Systems
420
Privacy Risk Assessment in Privacy Requirements Engineering
421
Privacy Risk in Graph Stream Publishing for Social Network Data
422
Privacy Risk, Security, Accountability in the Cloud
423
Privacy risks and challenges for the mobile internet
424
PrIvacy Risks And Countermeasures In Publishing And Mining Social Network Data
425
Privacy Risks in Publication of Taxi GPS Data
426
Privacy Risks in Publishing Mobile Device Trajectories
427
Privacy risks in recommender systems
428
Privacy scoring and users´ awareness for Web tracking
429
Privacy Scoring of Social Network Users as a Service
430
Privacy Sensitive Resource Access Monitoring for Android Systems
431
Privacy Sensitivity: Application in Arabic
432
Privacy settings from contextual attributes: A case study using Google Buzz
433
Privacy Settings in Online Social Networks -- Preferences, Perception, and Reality
434
Privacy Settings on Facebook: Their Roles and Importance
435
Privacy Support and Evaluation on an Ontological Basis
436
Privacy technology lessons from healthcare
437
Privacy Theft Malware Detection with Privacy Petri Net
438
Privacy threat modeling framework for online social networks
439
Privacy threats and issues in mobile RFID
440
Privacy Threats and Practical Solutions for Genetic Risk Tests
441
Privacy Threats from Social Networking Service Aggregators
442
Privacy Threats of Data Retention in Internet Communications
443
Privacy threats on Android devices ? Big brother is watching you
444
Privacy Threats Related to User Profiling in Online Social Networks
445
Privacy through Noise: A Design Space for Private Identification
446
Privacy Through Obscurity
447
Privacy through Uncertainty in Location-Based Services
448
Privacy through web-traveler policies in social network environments
449
Privacy Time-Related Analysis in Business Protocols
450
Privacy Tradeoff and Social Application Usage
451
Privacy using mobile cloud computing
452
Privacy Verification Using Ontologies
453
Privacy versus autonomy: A tradeoff model for smart home monitoring technologies
454
Privacy versus safety: who is safe?
455
Privacy Violation Classification of Snort Ruleset
456
Privacy violation in limited disclosure of database having functional dependency
457
Privacy Violations of Video Communications in a Ubiquitous Environment
458
Privacy Violations Using Microtargeted Ads: A Case Study
459
Privacy Visor: Method Based on Light Absorbing and Reflecting Properties for Preventing Face Image Detection
460
Privacy vs. information technology
461
Privacy vs. Security in National Emergencies
462
Privacy Vulnerability Analysis on Routing in Mobile Social Networks
463
Privacy Vulnerability of Published Anonymous Mobility Traces
464
Privacy Weaknesses in Biometric Sketches
465
Privacy with Web Serivces: Intelligence Gathering and Enforcement
466
Privacy–Security Trade-Offs in Biometric Security Systems—Part I: Single Use Case
467
Privacy–Security Trade-Offs in Biometric Security Systems—Part II: Multiple Use Case
468
Privacy, additional information and communication
469
Privacy, additional information, and communication
470
Privacy, Anonymity, and Accountability in Ad-Supported Services
471
Privacy, consumer trust and big data: Privacy by design and the 3 C´S
472
Privacy, cryptography and free research
473
Privacy, efficiency & fault tolerance in aggregate computations on massive star networks
474
Privacy, e-mail, and information policy: where ethics meets reality
475
Privacy, Ethics, and Analytics
476
Privacy, freedom and control in intelligent environment
477
Privacy, How Can I Protect You? How to Construct Safe Data Security System in E-commerce Transaction
478
Privacy, Identity and Trust in Context-Aware Mobile Services
479
Privacy, Preservation and Performance: The 3 P´s of Distributed Data Management
480
Privacy, publicness, and the web: A manifesto
481
Privacy, quality of information, and energy consumption in Participatory Sensing systems
482
Privacy, security and storage issues in medical data management
483
Privacy, Security and Trust in Cloud Computing: The Perspective of the Telecommunication Industry
484
Privacy, Security and Trust in P2P environments: A Perspective
485
Privacy, Security and Trust Issues Arising from Cloud Computing
486
Privacy, security concerns take on new meaning
487
Privacy, Value and Control Issues in Four Mobile Business Applications
488
Privacy, Wearable Computers, And Recording Technology
489
Privacy/Analysis Tradeoffs in Sharing Anonymized Packet Traces: Single-Field Case
490
Privacy: A few definitional aspects and consequences for minimax mean-squared error
491
Privacy: a machine learning view
492
Privacy: A non-existent entity
493
Privacy: A review of publication trends
494
Privacy: Aspects, definitions and a multi-faceted privacy preservation approach
495
Privacy: Front and Center
496
Privacy: Gone with the Typing! Identifying Web Users by Their Typing Patterns
497
Privacy: personal information, threats, and technologies
498
Privacy: Theory meets Practice on the Map
499
Privacy-area aware dummy generation algorithms for Location-Based Services
500
Privacy-Assured Outsourcing of Image Reconstruction Service in Cloud
501
Privacy-Assured Similarity Query over Graph-Structured Data in Mobile Cloud
502
Privacy-Aware Access Control and Authorization in Passive Network Monitoring Infrastructures
503
Privacy-aware access to Patient-controlled Personal Health Records in emergency situations
504
Privacy-aware and distributed system design for personalised alerting
505
Privacy-aware and energy-efficient geofencing through reverse cellular positioning
506
Privacy-Aware and Highly-Available OSN Profiles
507
Privacy-aware and trustworthy data aggregation in mobile sensing
508
Privacy-Aware Autonomous Agents for Pervasive Healthcare
509
Privacy-Aware BedTree Based Solution for Fuzzy Multi-keyword Search over Encrypted Data
510
Privacy-Aware Biometrics: Design and Implementation of a Multimodal Verification System
511
Privacy-Aware Cloaking Technique in Location-Based Services
512
Privacy-Aware Cloud Services Composition
513
Privacy-aware cloud-based input method editor
514
Privacy-Aware Collaborative Spam Filtering
515
Privacy-Aware Communication for Smartphones Using Vibration
516
Privacy-aware communication protocol for hybrid IEEE 802.11s/LTE Smart Grid architectures
517
Privacy-Aware Community Sensing Using Randomized Response
518
Privacy-Aware Context Discovery for Next Generation Mobile Services
519
Privacy-Aware Design Principles for Information Networks
520
Privacy-aware display strategy in friend search
521
Privacy-Aware Distributed Bayesian Detection
522
Privacy-aware dynamic feature selection
523
Privacy-aware event data recorders: cryptography meets the automotive industry again
524
Privacy-aware filter-based feature selection
525
Privacy-Aware Genome Mining: Server-Assisted Protocols for Private Set Intersection and Pattern Matching
526
Privacy-Aware Human Motion Tracking with Realtime Haptic Feedback
527
Privacy-aware IoT cloud survivability for future connected home ecosystem
528
Privacy-Aware Knowledge Discovery from Location Data
529
Privacy-Aware Large-Scale Virological and Epidemiological Data Monitoring
530
Privacy-Aware Location-Aided Routing in Mobile Ad Hoc Networks
531
Privacy-Aware Modelling and Distribution of Context Information in Pervasive Service Provision
532
Privacy-Aware Multi-Keyword Top-k Search over Untrust Data Cloud
533
Privacy-Aware Object Representation for Surveillance Systems
534
Privacy-Aware Passive Network Monitoring
535
Privacy-Aware personal Information Discovery model based on the cloud
536
Privacy-aware policy establishment and enforcement for information center repository: A case study of Government Meteorological Information Center Repository
537
Privacy-aware policy matching
538
Privacy-aware presence management in instant messaging systems
539
Privacy-aware probabilistic sampling for data collection in wireless sensor networks
540
Privacy-Aware Profiling and Statistical Data Extraction for Smart Sustainable Energy Systems
541
Privacy-Aware Proximity Based Services
542
Privacy-Aware RNN Query Processing on Location-Based Services
543
Privacy-Aware Role Based Access Control Model: Revisited for Multi-Policy Conflict Detection
544
Privacy-Aware Role-Based Access Control
545
Privacy-aware route tracing and revocation games in VANET-based clouds
546
Privacy-Aware Routing Approach for Mobile Applications
547
Privacy-Aware Service Integration
548
Privacy-Aware Smart Metering: A Survey
549
Privacy-Aware Smart Metering: A Survey
550
Privacy-Aware Traffic Monitoring
551
Privacy-Aware Web Service Composition and Ranking
552
Privacy-Aware Web Service Protocol Replaceability
553
Privacy-Aware Web Services Selection and Composition
554
Privacy-aware: Tracking and protecting sensitive information using automatic type inference
555
Privacy-by-Decoy: Protecting location privacy against collusion and deanonymization in vehicular location based services
556
Privacy-by-design based on quantitative threat modeling
557
Privacy-by-design cloud computing through decentralization and real life trust
558
Privacy-by-design in ITS applications
559
Privacy-by-Norms Privacy Expectations in Online Interactions
560
PrivacyCam: a Privacy Preserving Camera Using uCLinux on the Blackfin DSP
561
PrivacyCanary: Privacy-Aware Recommenders with Adaptive Input Obfuscation
562
Privacy-Centric Access Control for Distributed Heterogeneous Medical Information Systems
563
Privacy-concern for context-aware environments
564
Privacy-concerned parallel distributed Bayesian sequential detection
565
Privacy-conscious detection of roll-over based on thermography measurement
566
Privacy-conscious human detection using low-resolution video
567
Privacy-Conscious Location-Based Queries in Mobile Environments
568
Privacy-Enabled Global Threat Monitoring
569
Privacy-Enabled Global Threat Monitoring
570
Privacy-Enabled Object Tracking in Video Sequences Using Compressive Sensing
571
Privacy-enabled services for enterprises
572
Privacy-enhanced access control by SPKI and its application to Web server
573
Privacy-Enhanced Adult Certification Method for Multimedia Contents on Mobile RFID Environments
574
Privacy-enhanced bi-directional communication in the Smart Grid using trusted computing
575
Privacy-Enhanced Data Aggregation Scheme Against Internal Attackers in Smart Grid
576
Privacy-enhanced desktop meeting system
577
Privacy-Enhanced Event Scheduling
578
Privacy-enhanced filtering and collection middleware in EPCglobal networks
579
Privacy-Enhanced Group Communication for Vehicular Delay Tolerant Networks
580
Privacy-enhanced identity via browser extensions and linking services
581
Privacy-enhanced Internet storage
582
Privacy-Enhanced Keyword Search in Clouds
583
Privacy-enhanced perceptual hashing of audio data
584
Privacy-enhanced personalisation in ambient environments
585
Privacy-enhanced social network routing in opportunistic networks
586
Privacy-enhanced SPKI access control on PKIX and its application to Web server
587
Privacy-Enhanced Trusted Location Based Services (PE-TLBS) framework based on Direct Anonymous Attestation (DAA) protocol
588
Privacy-Enhanced User-Centric Identity Management
589
Privacy-Enhanced Web Service Composition
590
Privacy-enhancing Call Management in an IP-based Infrastructure
591
Privacy-enhancing cryptography-based materials
592
Privacy-enhancing technologies for the Internet
593
Privacy-friendly appliance load scheduling in smart grids
594
Privacy-Friendly Authentication in RFID Systems: On Sublinear Protocols Based on Symmetric-Key Cryptography
595
Privacy-friendly cloud audits with Somewhat Homomorphic and Searchable Encryption
596
Privacy-friendly distributed algorithm for energy management in smart grids
597
Privacy-Friendly Mobile RFID Reader Protocol Design based on trusted Agent and PKI
598
Privacy-friendly secure bidding scheme for demand response in smart grid
599
Privacy-friendly skies: Models, metrics, & solutions
600
Privacy-Friendly Smart Environments
601
Privacy-Guaranteeing Bidding in Smart Grid Demand Response Programs
602
Privacy-Invasive Software and Preventive Mechanisms
603
PrivacyJudge: Effective Privacy Controls for Online Published Information
604
Privacy-leakage codes for biometric authentication systems
605
PrivacyMod: Controlling and Monitoring Abuse of Privacy-Related Data by Android Applications
606
Privacy-mode switching: Toward flexible privacy protection for RFID tags in Internet of Things
607
Privacy-Openness Game in Virtual Life: The Game is a Premise for a Computer Supported Virtual Life
608
Privacy-Oriented Collaborative Learning Systems
609
Privacy-oriented discovery of interesting pattern from numeric attributes
610
PrivacyPalisade: Evaluating app permissions and building privacy into smartphones
611
Privacy-preservation association rules mining based on fuzzy correlation
612
Privacy-Preserved Access Control for Cloud Computing
613
Privacy-Preserved and Best-Effort Provisions of Cyber-I Information to Personalized Services
614
Privacy-Preserved Key Agreement with User Authentication
615
Privacy-Preserved Mobile Sensing through Hybrid Cloud Trust Framework
616
Privacy-Preserving 1-n-p Negotiation Protocol
617
Privacy-preserving access control model for big data cloud
618
Privacy-preserving admission to mobile peer-to-peer groups
619
Privacy-preserving advance power reservation
620
Privacy-Preserving Affinity Propagation Clustering over Vertically Partitioned Data
621
Privacy-preserving aggregation for participatory sensing with efficient group management
622
Privacy-preserving alert correlation: a concept hierarchy based approach
623
Privacy-Preserving and Content-Protecting Location Based Queries
624
Privacy-Preserving and Content-Protecting Location Based Queries
625
Privacy-Preserving and Outsourced Multi-user K-Means Clustering
626
Privacy-preserving and secure communication scheme for power injection in smart grid
627
Privacy-preserving and secure top-k query in two-tier wireless sensor network
628
Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks
629
Privacy-preserving anomaly detection across multi-domain networks
630
Privacy-preserving approach for sharing and processing intrusion alert data
631
Privacy-Preserving Approximate Convex Hulls Protocol
632
Privacy-preserving approximation of L1 distance for multimedia applications
633
Privacy-preserving architecture for forensic image recognition
634
Privacy-preserving assessment of social network data trustworthiness
635
Privacy-preserving association rule mining in large-scale distributed systems
636
Privacy-Preserving Association Rules Mining Using the Grouping Unrelated-Question Model
637
Privacy-preserving asymptotic average consensus
638
Privacy-Preserving Attribute Distribution Mechanism for Access Control in a Grid
639
Privacy-preserving attribute-based friend search in geosocial networks with untrusted servers
640
Privacy-Preserving Authenticated Key-Exchange Over Internet
641
Privacy-preserving authentication based on group signature for VANETs
642
Privacy-Preserving Authentication Based on Short Group Signature in Vehicular Networks
643
Privacy-preserving authentication solutions - best practices for implementation and EU regulatory perspectives
644
Privacy-preserving authentication with low computational overhead for RFID systems
645
Privacy-Preserving Backpropagation Neural Network Learning
646
Privacy-Preserving Basic Operations on Outsourced Search Trees
647
Privacy-Preserving Bayesian Network for Horizontally Partitioned Data
648
Privacy-preserving Bayesian network structure learning on distributed heterogeneous data
649
Privacy-Preserving Biometric Identification Using Secure Multiparty Computation: An Overview and Recent Trends
650
Privacy-preserving biometric person identification
651
Privacy-Preserving Biometric System for Secure Fingerprint Authentication
652
Privacy-preserving biometrics using matrix random low-rank approximation approach
653
Privacy-Preserving Business Process Outsourcing
654
Privacy-Preserving Channel Access for Internet of Things
655
Privacy-preserving channel access using blindfolded packet transmissions
656
Privacy-Preserving Ciphertext Multi-Sharing Control for Big Data Storage
657
Privacy-Preserving Classification on Horizontally Partitioned Data
658
Privacy-Preserving Clinical Decision Support System Using Gaussian Kernel-Based Classification
659
Privacy-preserving clone detection for RFID-enabled supply chains
660
Privacy-preserving clustering using C-means
661
Privacy-preserving collaborative data mining
662
Privacy-preserving collaborative filtering based on horizontally partitioned dataset
663
Privacy-preserving Collaborative Filtering for the Cloud
664
Privacy-Preserving Collaborative Filtering on Overlapped Ratings
665
Privacy-Preserving Collaborative Filtering on the Cloud and Practical Implementation Experiences
666
Privacy-Preserving Collaborative Filtering Protocol Based on Similarity between Items
667
Privacy-Preserving Collaborative Filtering Schemes
668
Privacy-preserving collaborative filtering using randomized perturbation techniques
669
Privacy-Preserving Collaborative Filtering Using Randomized Response
670
Privacy-Preserving Collaborative Learning for Mobile Health Monitoring
671
Privacy-Preserving Collaborative Path Hiding for Participatory Sensing Applications
672
Privacy-Preserving Collaborative Recommender Systems
673
Privacy-Preserving Collaborative Spectrum Sensing With Multiple Service Providers
674
Privacy-preserving community sensing for medical research with duplicated perturbation
675
Privacy-Preserving Compressive Sensing for Crowdsensing Based Trajectory Recovery
676
Privacy-preserving computation for location-based information survey via mobile cloud computing
677
Privacy-Preserving Computation of Bayesian Networks on Vertically Partitioned Data
678
Privacy-preserving concordance-based recommendations on vertically distributed data
679
Privacy-preserving conditional random selection
680
Privacy-Preserving Content-Based Image Retrieval in the Cloud
681
Privacy-Preserving Cooperative Downloading for Value-Added Services in VANETs
682
Privacy-Preserving Cooperative Linear System of Equations Protocol and its Application
683
Privacy-Preserving Cooperative Route Planning
684
Privacy-preserving cooperative scientific computations
685
Privacy-preserving cooperative statistical analysis
686
Privacy-preserving cross-domain network reachability quantification
687
Privacy-Preserving Cross-Domain Routing Optimization - A Cryptographic Approach
688
Privacy-preserving cross-user source-based data deduplication in cloud storage
689
Privacy-preserving data acquisition protocol
690
Privacy-preserving Data Aggregation Based on the P-function Set in Wireless Sensor Networks
691
Privacy-preserving data aggregation in Participatory Sensing Networks
692
Privacy-preserving data aggregation in smart metering systems: an overview
693
Privacy-preserving data aggregation without secure channel: Multivariate polynomial evaluation
694
Privacy-preserving data collection and recovery of compressive sensing
695
Privacy-preserving data collection for demand response using self-organizing map
696
Privacy-Preserving Data Exfiltration Monitoring Using Homomorphic Encryption
697
Privacy-Preserving Data Imputation
698
Privacy-Preserving Data Linkage and Geocoding: Current Approaches and Research Directions
699
Privacy-Preserving Data Linkage through Blind Geo-spatial Data Aggregation
700
Privacy-Preserving Data Management in Mobile Environments: A Partial Encryption Approach
701
Privacy-Preserving Data Mashup
702
Privacy-Preserving Data Mining Applications in the Malicious Model
703
Privacy-Preserving Data Mining Based on Sample Selection and Singular Value Decomposition
704
Privacy-preserving data mining demonstrator
705
Privacy-preserving data mining on data grids in the presence of malicious participants
706
Privacy-Preserving Data Mining on Moving Object Trajectories
707
Privacy-Preserving Data Mining Systems
708
Privacy-preserving data mining: why, how, and when
709
Privacy-preserving data publication: A review on “updates” in continuous data publication
710
Privacy-preserving data publishing
711
Privacy-Preserving Data Publishing Based on De-clustering
712
Privacy-Preserving Data Publishing Based on Utility Specification
713
Privacy-Preserving Data Publishing for Free Text Chinese Electronic Medical Records
714
Privacy-Preserving Data Publishing in the Cloud: A Multi-level Utility Controlled Approach
715
Privacy-preserving data sharing in Smart Grid systems
716
Privacy-Preserving Data Storage in Cloud Using Array BP-XOR Codes
717
Privacy-Preserving Database Assisted Spectrum Access: A Socially-Aware Distributed Learning Approach
718
Privacy-Preserving DBSCAN Clustering Over Vertically Partitioned Data
719
Privacy-preserving DBSCAN on horizontally partitioned data
720
Privacy-Preserving Decentralized Access Control for Cloud Storage Systems
721
Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption
722
Privacy-preserving deep learning
723
Privacy-Preserving Dense Subgraph Discovery in Mobile Social Networks
724
Privacy-Preserving Detection of Plagiarism in Scientific Documents
725
Privacy-Preserving Detection of Sensitive Data Exposure
726
Privacy-Preserving Detection of Sybil Attacks in Vehicular Ad Hoc Networks
727
Privacy-Preserving Digital Rights Management based on Attribute-based Encryption
728
Privacy-Preserving Digital Rights Management in a Trusted Cloud Environment
729
Privacy-preserving distributed association rule mining based on the secret sharing technique
730
Privacy-preserving distributed clustering using generative models
731
Privacy-preserving distributed cooperative spectrum sensing in multi-channel cognitive radio MANETs
732
Privacy-Preserving Distributed Decision Tree Learning with Boolean Class Attributes
733
Privacy-preserving distributed mining of association rules on horizontally partitioned data
734
Privacy-Preserving Distributed Profile Matching in Proximity-Based Mobile Social Networks
735
Privacy-Preserving Distributed Set Intersection
736
Privacy-preserving distributed speech enhancement forwireless sensor networks by processing in the encrypted domain
737
Privacy-preserving distributed statistical computation to a semi-honest multi-cloud
738
Privacy-preserving domain-flux botnet detection in a large scale network
739
Privacy-Preserving Dose-Response Relationship Test
740
Privacy-Preserving DRM for Cloud Computing
741
Privacy-preserving dual splitting distributed optimization with application to load flattening in California
742
Privacy-Preserving ECG Classification With Branching Programs and Neural Networks
743
Privacy-preserving electronic health record linkage using pseudonym identifiers
744
Privacy-Preserving Energy Scheduling in Microgrid Systems
745
Privacy-preserving energy theft detection in smart grids
746
Privacy-Preserving Energy Theft Detection in Smart Grids: A P2P Computing Approach
747
Privacy-Preserving Enforcement of Spatially Aware RBAC
748
Privacy-Preserving Enhanced Collaborative Tagging
749
Privacy-Preserving Epidemiological Analysis for a Distributed Database of Hospitals
750
Privacy-preserving event detection in pervasive spaces
751
Privacy-Preserving Fraud Detection Across Multiple Phone Record Databases
752
Privacy-preserving frequent itemset mining in outsourced transaction databases
753
Privacy-preserving frequent pattern mining across private databases
754
Privacy-preserving friendship establishment based on blind signature and bloom filter in mobile social networks
755
Privacy-preserving function computation by exploitation of friendships in social networks
756
Privacy-preserving functional IP verification utilizing fully homomorphic encryption
757
Privacy-Preserving Gradient-Descent Methods
758
Privacy-preserving granular data retrieval indexes for outsourced cloud data
759
Privacy-preserving handover mechanism in 4G
760
Privacy-preserving high-quality map generation with participatory sensing
761
Privacy-Preserving Hypothesis Testing for the Analysis of Epidemiological Medical Data
762
Privacy-preserving identity federation middleware for web services (PIFM-WS)
763
Privacy-preserving in web services using hippocratic database
764
Privacy-Preserving Indoor Localization on Smartphones
765
Privacy-preserving information sharing and management schema for collaborative social networks
766
Privacy-Preserving Integrity-Assured Data Aggregation in Sensor Networks
767
Privacy-preserving interest-casting in opportunistic networks
768
Privacy-preserving item-based Collaborative Filtering using semi-distributed Belief Propagation
769
Privacy-Preserving Kernel k-Means Outsourcing with Randomized Kernels
770
Privacy-Preserving k-NN for Small and Large Data Sets
771
Privacy-Preserving Kth Element Score over Vertically Partitioned Data
772
Privacy-Preserving Layer over MapReduce on Cloud
773
Privacy-preserving license plate image processing
774
Privacy-preserving location and mobility management to support tether-free patients in ad-hoc networks
775
Privacy-preserving location authentication in WiFi with fine-grained physical layer information
776
Privacy-Preserving Location-Based On-Demand Routing in MANETs
777
Privacy-preserving location-dependent query processing
778
Privacy-Preserving Location-Dependent Query Processing
779
Privacy-preserving logical vector clocks using secure computation techniques
780
Privacy-Preserving Machine Learning Algorithms for Big Data Systems
781
Privacy-preserving matchmaking For mobile social networking secure against malicious users
782
Privacy-Preserving Mechanism for Monitoring Sensitive Data
783
Privacy-Preserving Medical Reports Publishing for Cluster Analysis
784
Privacy-preserving min and k-th min computations with fully homomorphic encryption
785
Privacy-Preserving Mining of Association Rules From Outsourced Transaction Databases
786
Privacy-preserving mining of decision trees using data negation approach
787
Privacy-Preserving Mining of Frequent Routes in Cellular Network Data
788
Privacy-preserving mobile access to Personal Health Records through Google´s Android
789
Privacy-Preserving Mobile Accesses for Virtual Private Social Media
790
Privacy-preserving mobility-casting in opportunistic networks
791
Privacy-Preserving Multi-agent Constraint Satisfaction
792
Privacy-Preserving Multi-Class Support Vector Machine for Outsourcing the Data Classification in Cloud
793
Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud
794
Privacy-preserving multi-keyword ranked search over encrypted big data
795
Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data
796
Privacy-preserving multi-keyword ranked search over encrypted cloud data
797
Privacy-Preserving Multi-Keyword Search in Information Networks
798
Privacy-preserving multimedia cloud computing via compressive sensing and sparse representation
799
Privacy-Preserving Multiparty Collaborative Mining with Geometric Data Perturbation
800
Privacy-Preserving Multi-Point Traffic Volume Measurement Through Vehicle-to-Infrastructure Communications
801
Privacy-preserving multi-set operations
802
Privacy-Preserving Musical Database Matching
803
Privacy-preserving Naive Bayes classification using trusted third party and different offset computation over distributed databases
804
Privacy-preserving nearest neighbor methods: comparing signals without revealing them
805
Privacy-preserving nonlinear observer design using contraction analysis
806
Privacy-Preserving OLAP: An Information-Theoretic Approach
807
Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices
808
Privacy-preserving outlier detection
809
Privacy-Preserving Outlier Detection Through Random Nonlinear Data Distortion
810
Privacy-Preserving Outsourced Profiling
811
Privacy-preserving outsourcing of image global feature detection
812
Privacy-preserving participatory sensing
813
Privacy-preserving path-inclusion protocol through oblivious automata
814
Privacy-Preserving Personalized Recommendation: An Instance-Based Approach via Differential Privacy
815
Privacy-preserving personalized search over encrypted cloud data supporting multi-keyword ranking
816
Privacy-preserving photo sharing based on a secure JPEG
817
Privacy-preserving PKIs with reduced server trust
818
Privacy-Preserving Point-Inclusion Two-Party Computation Protocol
819
Privacy-Preserving Point-to-Point Transportation Traffic Measurement through Bit Array Masking in Intelligent Cyber-physical Road Systems
820
Privacy-preserving population-enhanced biometric key generation from free-text keystroke dynamics
821
Privacy-Preserving Power Request in Smart Grid Networks
822
Privacy-Preserving Practical Convex Hulls Protocol
823
Privacy-Preserving Profile Matching for Proximity-Based Mobile Social Networking
824
Privacy-preserving profile matching using the social graph
825
Privacy-preserving proof of storage in large group
826
Privacy-Preserving Protocol for Epidemiology in Effect of Radiation
827
Privacy-preserving Protocols for Finding the Convex Hulls
828
Privacy-preserving protocols for perceptron learning algorithm in neural networks
829
Privacy-Preserving Protocols for Shortest Path Discovery over Outsourced Encrypted Graph Data
830
Privacy-Preserving Protocols for String Matching
831
Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing
832
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
833
Privacy-Preserving Public Auditing for Secure Cloud Storage
834
Privacy-preserving public auditing for shared cloud data supporting group dynamics
835
Privacy-preserving publication of diagnosis codes for effective biomedical analysis
836
Privacy-Preserving Publication of Mobility Data with High Utility
837
Privacy-Preserving Publishing of Pseudonym-Based Trajectory Location Data Set
838
Privacy-Preserving Quantification of Cross-Domain Network Reachability
839
Privacy-Preserving Queries over Outsourced Data with Access Pattern Protection
840
Privacy-Preserving Query based on Virtual Organization in Grid Database
841
Privacy-Preserving Query Checking in Query Middleware
842
Privacy-Preserving Query over Encrypted Graph-Structured Data in Cloud Computing
843
Privacy-preserving Query-by-Example Speech Search
844
Privacy-Preserving Querying in Sensor Networks
845
Privacy-Preserving Quick Authentication in Fast Roaming Networks
846
Privacy-preserving range set union for rare cases in healthcare data
847
Privacy-Preserving Ranked Fuzzy Keyword Search over Encrypted Cloud Data
848
Privacy-preserving ranked multi-keyword search leveraging polynomial function in cloud computing
849
Privacy-Preserving Ranked Search on Public-Key Encrypted Data
850
Privacy-preserving reachability query services for sparse graphs
851
Privacy-preserving realization of the STORK framework in the public cloud
852
Privacy-Preserving Reasoning on the SemanticWeb
853
Privacy-Preserving Recommendation Systems for Consumer Healthcare Services
854
Privacy-preserving recommender systems in dynamic environments
855
Privacy-preserving relative location based services for mobile users
856
Privacy-preserving resource evaluation in social networks
857
Privacy-preserving revocable content sharing in geosocial networks
858
Privacy-preserving RFID authentication based on cryptographical encoding
859
Privacy-Preserving Ridge Regression on Hundreds of Millions of Records
860
Privacy-preserving route reporting scheme for traffic management in VANETs
861
Privacy-preserving routing in delay tolerant networks based on Bloom filters
862
Privacy-preserving scheme for mobile ad hoc networks
863
Privacy-preserving scheme in smart grid communication using enhanced network coding
864
Privacy-Preserving Segment-Ellipse Intersect-Determination Protocol
865
Privacy-preserving self-localization techniques in next generation manufacturing An interdisciplinary view on the vision and implementation of smart factories
866
Privacy-preserving set intersection in outsourcing environments
867
Privacy-Preserving Set Operations in the Presence of Rational Parties
868
Privacy-Preserving Sharing of Sensitive Information
869
Privacy-Preserving Sharing of Sensitive Semantic Locations under Road-Network Constraints
870
Privacy-Preserving SimRank over Distributed Information Network
871
Privacy-Preserving Singular Value Decomposition
872
Privacy-Preserving Skyline Queries in LBS
873
Privacy-preserving smart metering without a trusted-third-party
874
Privacy-Preserving Social Network for an Untrusted Server
875
Privacy-preserving social recommendations in geosocial networks
876
Privacy-Preserving Spatial Trajectory Prediction
877
Privacy-preserving spatiotemporal matching
878
Privacy-Preserving Speaker Verification and Identification Using Gaussian Mixture Models
879
Privacy-preserving speaker verification as password matching
880
Privacy-preserving speaker verification using garbled GMMS
881
Privacy-preserving speaker verification using secure binary embeddings
882
Privacy-preserving spectral estimation in smart grid
883
Privacy-preserving speech processing: cryptographic and string-matching frameworks show promise
884
Privacy-Preserving Statistical Analysis by Exact Logistic Regression
885
Privacy-Preserving Statistical Analysis Method for Real-World Data
886
Privacy-preserving strategies in service quality aware Location-Based Services
887
Privacy-preserving SVANETs: Privacy-preserving simple vehicular ad-hoc networks
888
Privacy-preserving SVM classification on arbitrarily partitioned data
889
Privacy-Preserving SVM Classification on Vertically Partitioned Data without Secure Multi-party Computation
890
Privacy-preserving SVM of horizontally partitioned data for linear classification
891
Privacy-Preserving Tabu Search for Distributed Graph Coloring
892
Privacy-Preserving Techniques and System for Streaming Databases
893
Privacy-Preserving Techniques for Proximity Based LBS
894
Privacy-Preserving Technology for Secure Utilization of Sensor Data (Extended Abstract)
895
Privacy-Preserving Telecardiology Sensor Networks: Toward a Low-Cost Portable Wireless Hardware/Software Codesign
896
Privacy-Preserving Temperature Query Protocol in Cold-Chain Logistics
897
Privacy-preserving top-k keyword similarity search over outsourced cloud data
898
Privacy-preserving top-N recommendation on horizontally partitioned data
899
Privacy-Preserving Traffic Monitoring in Vehicular Ad Hoc Networks
900
Privacy-Preserving Trajectory Publication against Parking Point Attacks
901
Privacy-Preserving Trust Management for Social-Based P2P Networks
902
Privacy-Preserving Trust-Based Recommendations on Vertically Distributed Data
903
Privacy-Preserving Tuple Matching in Distributed Databases
904
Privacy-Preserving Two-Party Distributed Association Rules Mining on Horizontally Partitioned Data
905
Privacy-Preserving Two-Party k-Means Clustering in Malicious Model
906
Privacy-Preserving Two-Party K-Means Clustering via Secure Approximation
907
Privacy-Preserving Ubiquitous Social Mining via Modular and Compositional Virtual Sensors
908
Privacy-Preserving Universal Authentication Protocol for Wireless Communications
909
Privacy-Preserving Updates to Anonymous and Confidential Databases
910
Privacy-preserving use of genomic data on mobile devices
911
Privacy-preserving user clustering in a social network
912
Privacy-preserving verifiable incentive mechanism for online crowdsourcing markets
913
Privacy-Preserving Verifiable Proximity Test for Location-Based Services
914
Privacy-preserving web search
915
Privacy-Preserving WebID Analytics on the Decentralized Policy-Aware Social Web
916
Privacy-Preserving Wireless Medical Sensor Network
917
Privacy-protecting index for outsourced databases
918
Privacy-Protection in Real-Time Video Communication
919
Privacy-protection solid-state storage (PP-SSS) system: Automatic lifetime management of internet-data´s right to be forgotten
920
Privacy-relevant smart metering use cases
921
Privacy-respecting digital investigation
922
Privacy-respecting discovery of data providers in crowd-sensing applications
923
Privacy-security tradeoffs in biometric security systems
924
Privacy-security tradeoffs in reusable biometric security systems
925
Privacy-Sensitive Audio Features for Speech/Nonspeech Detection
926
Privacy-sensitive Bayesian network parameter learning
927
Privacy-triggered communications in pervasive social networks
928
Privacy-utility trade-off under continual observation
929
Privacy-utility tradeoff under statistical uncertainty
930
Private (t,n) Threshold Searching on Streaming Data
931
Private accounting system for X.25 host
932
Private and Anonymous Data Storage and Distribution in Cloud
933
Private and blind digital fingerprinting schemes based upon complete complementary codes
934
Private and Cheating-Free Outsourcing of Algebraic Computations
935
Private and fair pay-per-view scheme for Web-based video-on-demand systems
936
Private and Flexible Proximity Detection in Mobile Social Networks
937
Private and public ISDN-planning the wedding
938
Private and resilient data aggregation
939
Private and Secure Service Discovery Using Incrementally Progressive Exposure and Random Match
940
Private and Secure Service Discovery via Progressive and Probabilistic Exposure
941
Private and secure service discovery via progressive approach in pervasive computing environments
942
Private Anonymous Messaging
943
Private ATM networks: alternative control algorithms and their performance
944
Private auctions with multiple rounds and multiple items
945
Private Audio Streaming for an Automated Phone Assistance System
946
Private Badges for Geosocial Networks
947
Private Broadcasting Over Independent Parallel Channels
948
Private broadcasting with probing constraint
949
Private Browsing Mode Not Really That Private: Dealing with Privacy Breach Caused by Browser Extensions
950
Private Buddy Search: Enabling Private Spatial Queries in Social Networks
951
Private cache partitioning: A method to reduce the off-chip missrate of concurrently executing applications in Chip-Multiprocessors
952
Private chaotic biometric template protection algorithm
953
Private circuits II versus fault injection attacks
954
Private classical capacity with symmetric assistance
955
Private cloud and media privacy in social networks
956
Private Cloud Configuration with MetaConfig
957
Private Cloud Cooperation Framework of E-Learning Environment for Disaster Recovery
958
Private cloud security: Secured user authentication by using enhanced hybrid algorithm
959
Private Cloud System Based on BOINC with Support for Parallel and Distributed Simulation
960
Private cluster head election in wireless sensor networks
961
Private codes or succinct random codes that are (almost) perfect
962
Private Communication and Authentication Protocol for Wireless Sensor Networks
963
Private communication over fading channels with chaotic DS/SS
964
Private computations over the integers
965
Private Computing with Garbled Circuits [Applications Corner]
966
Private configuration environments (PCE) for efficient reconfiguration, in CGRAs
967
Private Content Based Image Retrieval
968
Private content identification: Performance-privacy-complexity trade-off
969
Private context-aware recommendation of points of interest: An initial investigation
970
Private Controlling Ownership, Tunneling and Corporate Performance in China
971
Private creation of Internet “law”: overcoming a false intellectual universe
972
Private data aggregation with groups for smart grids in a dynamic setting using CRT
973
Private data broadcasting using digital TV and MPEG-2 Transport Stream
974
Private data transfer over a broadcast channel
975
Private desktops and shared store
976
Private Domains in Networks of Information
977
Private Dynamic Epistemic Friendship Logic
978
Private Editing Using Untrusted Cloud Services
979
Private Empirical Risk Minimization: Efficient Algorithms and Tight Error Bounds
980
Private enterprises path selection in the process of reform management
981
Private ENUM based number portability administrative system evaluation
982
Private Equity Exit Choice Based on Fuzzy Optimization
983
Private equity exit risk avoiding base on multi-objective optimization
984
Private Equity Investment Game Base on Fuzzy Optimization
985
Private Equity Investment Projects Selection Based on Grey Relational Analysis
986
Private equity investment selection decision-making base on fuzzy optimal
987
Private equity investment selection game base on grey assessment in agricultural production and processing enterprises
988
Private Equity Syndicator Choice Base on Grey Assessment
989
Private eyes: Secure remote biometric authentication
990
Private Facebook Chat
991
Private generators
992
Private handshakes with optional accountability
993
Private image computation: The case of cloud based privacy-preserving SIFT
994
Private image region protection and reconstruction scheme for cloud-based video monitoring system using transform domain Wyner-Ziv video coding
995
Private Inference Control for Aggregate Database Queries
996
Private information center aspects
997
Private Information Protection System with Web-Crawler
998
Private information retrieval
999
Private information retrieval for coded storage
1000
Private information retrieval in the presence of malicious failures
بازگشت