Works matching DE "DATA privacy"
Results: 5000
Protection of Privacy Rights of Internet Users Against Cross-Border Government Interference.
- Published in:
- International Journal of Legal Information, 2014, v. 42, n. 3, p. 493, doi. 10.1017/S0731126500012191
- By:
- Publication type:
- Article
Data Protection in the European Union: A Closer Look at the Current Patchwork of Data Protection Laws and the Proposed Reform That Could Replace Them All.
- Published in:
- International Journal of Legal Information, 2014, v. 42, n. 3, p. 471, doi. 10.1017/S073112650001218X
- By:
- Publication type:
- Article
Twin Inadequacies in the FTC's Recent Biometrics Policy Statement.
- Published in:
- University of Chicago Law Review, 2024, p. 497
- By:
- Publication type:
- Article
Authoritarian Privacy.
- Published in:
- University of Chicago Law Review, 2024, v. 91, n. 3, p. 733
- By:
- Publication type:
- Article
APROXIMACIÓN A LAS NUEVAS FORMAS DE SOCIABILIDAD DIGITAL IMPULSADAS POR LA PANDEMIA.
- Published in:
- Anales de Documentación, 2022, v. 25, p. 1, doi. 10.6018/analesdoc.510841
- By:
- Publication type:
- Article
Breaking Away: How to Regain Control Over Our Data, Privacy, and Autonomy.
- Published in:
- 2024
- By:
- Publication type:
- Book Review
Domain adaptive Sim-to-Real segmentation of oropharyngeal organs.
- Published in:
- Medical & Biological Engineering & Computing, 2023, v. 61, n. 10, p. 2745, doi. 10.1007/s11517-023-02877-0
- By:
- Publication type:
- Article
COMPETENCIA JUDICIAL INTERNACIONAL Y PROTECCIÓN DE DATOS PERSONALES EN EL REGLAMENTO GENERAL DE PROTECCIÓN DE DATOS: SU ENCAJE CON EL REGLAMENTO BRUSELAS I BIS.
- Published in:
- Revista Jurídica de la Universidad Autonóma de Madrid, 2022, n. 45, p. 127, doi. 10.15366/rjuam2022.45.006
- By:
- Publication type:
- Article
Design & Development of Hybrid Electric Fish-Harris Hawks Optimization-Based Privacy Preservation of Data in Supply Chain Network with Block Chain Technology.
- Published in:
- International Journal of Information Technology & Decision Making, 2024, v. 23, n. 4, p. 1601, doi. 10.1142/S0219622023500451
- By:
- Publication type:
- Article
Knowledge distillation-based information sharing for online process monitoring in decentralized manufacturing system.
- Published in:
- Journal of Intelligent Manufacturing, 2025, v. 36, n. 3, p. 2177, doi. 10.1007/s10845-024-02348-9
- By:
- Publication type:
- Article
Federated learning-based collaborative manufacturing for complex parts.
- Published in:
- Journal of Intelligent Manufacturing, 2023, v. 34, n. 7, p. 3025, doi. 10.1007/s10845-022-01968-3
- By:
- Publication type:
- Article
GAN-Based Privacy-Preserving Intelligent Medical Consultation Decision-Making.
- Published in:
- Group Decision & Negotiation, 2024, v. 33, n. 6, p. 1495, doi. 10.1007/s10726-024-09902-z
- By:
- Publication type:
- Article
Optimizing AI-assisted communication in urology: potential and challenges.
- Published in:
- World Journal of Urology, 2025, v. 43, n. 1, p. 1, doi. 10.1007/s00345-025-05508-5
- By:
- Publication type:
- Article
Adaptive steganography based on block complexity and matrix embedding.
- Published in:
- Multimedia Systems, 2014, v. 20, n. 2, p. 227, doi. 10.1007/s00530-013-0313-5
- By:
- Publication type:
- Article
A novel joint secret image sharing and robust steganography method using wavelet.
- Published in:
- Multimedia Systems, 2014, v. 20, n. 2, p. 215, doi. 10.1007/s00530-013-0341-1
- By:
- Publication type:
- Article
Artificial intelligence publications: synthetic data, patients, and papers.
- Published in:
- International Orthopaedics, 2023, v. 47, n. 6, p. 1395, doi. 10.1007/s00264-023-05830-w
- By:
- Publication type:
- Article
A Novel Image Encryption Technique Based on Generalized Advanced Encryption Standard Based on Field of Any Characteristic.
- Published in:
- Wireless Personal Communications, 2019, v. 109, n. 2, p. 849, doi. 10.1007/s11277-019-06594-6
- By:
- Publication type:
- Article
Experimental Analysis of Subscribers' Privacy Exposure by LTE Paging.
- Published in:
- Wireless Personal Communications, 2019, v. 109, n. 1, p. 675, doi. 10.1007/s11277-019-06585-7
- By:
- Publication type:
- Article
SECRECSY: A Secure Framework for Enhanced Privacy-Preserving Location Recommendations in Cloud Environment.
- Published in:
- Wireless Personal Communications, 2019, v. 108, n. 3, p. 1869, doi. 10.1007/s11277-019-06500-0
- By:
- Publication type:
- Article
A Review of Security in Internet of Things.
- Published in:
- Wireless Personal Communications, 2019, v. 108, n. 1, p. 325, doi. 10.1007/s11277-019-06405-y
- By:
- Publication type:
- Article
Retraction Note to: Location Privacy with Dynamic Pseudonym-Based Multiple Mix-Zones Generation over Road Networks.
- Published in:
- Wireless Personal Communications, 2019, v. 107, n. 1, p. 707, doi. 10.1007/s11277-019-06432-9
- By:
- Publication type:
- Article
On the Suitability of Applying WordNet to Privacy Measurement.
- Published in:
- Wireless Personal Communications, 2018, v. 103, n. 1, p. 359, doi. 10.1007/s11277-018-5447-5
- By:
- Publication type:
- Article
An Improved Pillar K-Means Based Protocol for Privacy-Preserving Location Monitoring in Wireless Sensor Network.
- Published in:
- Wireless Personal Communications, 2018, v. 101, n. 2, p. 915, doi. 10.1007/s11277-018-5733-2
- By:
- Publication type:
- Article
Are RNGs Achilles’ Heel of RFID Security and Privacy Protocols?
- Published in:
- Wireless Personal Communications, 2018, v. 100, n. 4, p. 1355, doi. 10.1007/s11277-018-5643-3
- By:
- Publication type:
- Article
Privacy-Preserving Public Auditing for Non-manager Group Shared Data.
- Published in:
- Wireless Personal Communications, 2018, v. 100, n. 4, p. 1277, doi. 10.1007/s11277-018-5634-4
- By:
- Publication type:
- Article
A New Gradual Secret Sharing Scheme with Diverse Access Structure.
- Published in:
- Wireless Personal Communications, 2018, v. 99, n. 3, p. 1329, doi. 10.1007/s11277-017-5187-y
- By:
- Publication type:
- Article
Privacy-Preserving Mutual Authentication in RFID with Designated Readers.
- Published in:
- Wireless Personal Communications, 2017, v. 96, n. 3, p. 4819, doi. 10.1007/s11277-017-4430-x
- By:
- Publication type:
- Article
Priority-Aware Interests Similarity Protocol (PAISP) for Proximity Based Mobile Social Network.
- Published in:
- Wireless Personal Communications, 2017, v. 95, n. 2, p. 1171, doi. 10.1007/s11277-016-3823-6
- By:
- Publication type:
- Article
A Trajectory Privacy Model for Radio-Frequency Identification System.
- Published in:
- Wireless Personal Communications, 2016, v. 90, n. 3, p. 1121, doi. 10.1007/s11277-016-3381-y
- By:
- Publication type:
- Article
An Efficient Authentication Scheme to Protect User Privacy in Seamless Big Data Services.
- Published in:
- Wireless Personal Communications, 2016, v. 86, n. 1, p. 7, doi. 10.1007/s11277-015-2990-1
- By:
- Publication type:
- Article
Traceability Analysis of Recent RFID Authentication Protocols.
- Published in:
- Wireless Personal Communications, 2015, v. 83, n. 3, p. 1663, doi. 10.1007/s11277-015-2469-0
- By:
- Publication type:
- Article
A New Privacy-Aware Handover Authentication Scheme for Wireless Networks.
- Published in:
- Wireless Personal Communications, 2015, v. 80, n. 2, p. 581, doi. 10.1007/s11277-014-2029-z
- By:
- Publication type:
- Article
An Efficient Ticket Based Authentication Protocol with Unlinkability for Wireless Access Networks.
- Published in:
- Wireless Personal Communications, 2014, v. 77, n. 2, p. 1489, doi. 10.1007/s11277-013-1594-x
- By:
- Publication type:
- Article
A Role Based Privacy-Aware Secure Routing Protocol for Wireless Mesh Networks.
- Published in:
- Wireless Personal Communications, 2014, v. 75, n. 3, p. 1611, doi. 10.1007/s11277-013-1171-3
- By:
- Publication type:
- Article
Cryptanalysis and Improvement of an Anonymous Authentication Protocol for Wireless Access Networks.
- Published in:
- Wireless Personal Communications, 2014, v. 74, n. 2, p. 229, doi. 10.1007/s11277-013-1282-x
- By:
- Publication type:
- Article
SER Performance of Amplify-and-Forward Cooperative Diversity Over Asymmetric Fading Channels.
- Published in:
- Wireless Personal Communications, 2013, v. 73, n. 3, p. 1117, doi. 10.1007/s11277-013-1251-4
- By:
- Publication type:
- Article
A Secure and Effective Anonymous User Authentication Scheme for Roaming Service in Global Mobility Networks.
- Published in:
- Wireless Personal Communications, 2013, v. 73, n. 3, p. 993, doi. 10.1007/s11277-013-1243-4
- By:
- Publication type:
- Article
Prevention of DoS Attacks in VANET.
- Published in:
- Wireless Personal Communications, 2013, v. 73, n. 1, p. 95, doi. 10.1007/s11277-013-1161-5
- By:
- Publication type:
- Article
Vulnerabilities of Decentralized Additive Reputation Systems Regarding the Privacy of Individual Votes.
- Published in:
- Wireless Personal Communications, 2012, v. 66, n. 3, p. 559, doi. 10.1007/s11277-012-0734-z
- By:
- Publication type:
- Article
The ultimate physical limits of privacy.
- Published in:
- Nature, 2014, v. 507, n. 7493, p. 443, doi. 10.1038/nature13132
- By:
- Publication type:
- Article
Personalizing guest experience with generative AI in the hotel industry: there's more to it than meets a Kiwi's eye.
- Published in:
- Current Issues in Tourism, 2025, v. 28, n. 4, p. 527, doi. 10.1080/13683500.2023.2300030
- By:
- Publication type:
- Article
Artificial Intelligence Policy in Promoting Indonesian Tourism.
- Published in:
- Volksgeist: Jurnal Ilmu Hukurn dan Konstitusi, 2024, v. 7, n. 1, p. 109, doi. 10.24090/volksgeist.v7i1.10623
- By:
- Publication type:
- Article
Sharia E-Wallet: The Issue of Sharia Compliance and Data Protection.
- Published in:
- Al-Manahij: Jurnal Kajian Hukum Islam, 2023, v. 17, n. 1, p. 53, doi. 10.24090/mnh.v17i1.7633
- By:
- Publication type:
- Article
Beyond boundaries: exploring the transformative power of AI in pharmaceuticals.
- Published in:
- Discover Artificial Intelligence, 2024, v. 4, n. 1, p. 1, doi. 10.1007/s44163-024-00192-7
- By:
- Publication type:
- Article
The role of ChatGPT in sports trauma: a mini review on strengths and limits of open AI application.
- Published in:
- Discover Artificial Intelligence, 2023, v. 3, n. 1, p. 1, doi. 10.1007/s44163-023-00093-1
- By:
- Publication type:
- Article
Artificial Intelligence in Healthcare: Ethical Considerations and Potential Impact in Pakistan.
- Published in:
- International Journal of Social Science Archives (IJSSA), 2024, v. 7, n. 3, p. 1231
- By:
- Publication type:
- Article
An Evolutionary Road Map to Winning with Social Media Marketing.
- Published in:
- Marketing Research, 2012, v. 24, n. 2, p. 4
- By:
- Publication type:
- Article
Design thinking and artificial intelligence: A systematic literature review exploring synergies.
- Published in:
- International Journal of Innovation Studies, 2024, v. 8, n. 3, p. 297, doi. 10.1016/j.ijis.2024.05.001
- By:
- Publication type:
- Article
Exploring the Feasibility and Acceptability of Technological Interventions to Prevent Adolescents' Exposure to Online Pornography: Qualitative Research.
- Published in:
- JMIR Pediatrics & Parenting, 2024, v. 7, p. 1, doi. 10.2196/58684
- By:
- Publication type:
- Article
Digital Interventions for Combating Internet Addiction in Young Children: Qualitative Study of Parent and Therapist Perspectives.
- Published in:
- JMIR Pediatrics & Parenting, 2024, v. 7, p. 1, doi. 10.2196/55364
- By:
- Publication type:
- Article