Found: 16
Select item for more details and to access through your institution.
An Effective Model of Confidentiality Management of Digital Archives in a Cloud Environment.
- Published in:
- Electronics (2079-9292), 2022, v. 11, n. 18, p. N.PAG, doi. 10.3390/electronics11182831
- By:
- Publication type:
- Article
A user sensitive subject protection approach for book search service.
- Published in:
- Journal of the Association for Information Science & Technology, 2020, v. 71, n. 2, p. 183, doi. 10.1002/asi.24227
- By:
- Publication type:
- Article
A Patient Privacy Protection Scheme for Medical Information System.
- Published in:
- Journal of Medical Systems, 2013, v. 37, n. 6, p. 1, doi. 10.1007/s10916-013-9982-z
- By:
- Publication type:
- Article
Enabling Access Control for Encrypted Multi-Dimensional Data in Cloud Computing through Range Search.
- Published in:
- Technical Gazette / Tehnički Vjesnik, 2023, v. 30, n. 6, p. 1704, doi. 10.17559/TV-20230415000536
- By:
- Publication type:
- Article
An Efficient Top-k Query Scheme Based on Multilayer Grouping.
- Published in:
- Technical Gazette / Tehnički Vjesnik, 2019, v. 26, n. 5, p. 1339, doi. 10.17559/TV-20190124092015
- By:
- Publication type:
- Article
Efficient Q-Value Zero-Leakage Protection Scheme in SRS Regularly Publishing Private Data.
- Published in:
- Technical Gazette / Tehnički Vjesnik, 2019, v. 26, n. 3, p. 695, doi. 10.17559/TV-20181218005415
- By:
- Publication type:
- Article
Improving contextual advertising matching by using Wikipedia thesaurus knowledge.
- Published in:
- Knowledge & Information Systems, 2015, v. 43, n. 3, p. 599, doi. 10.1007/s10115-014-0745-z
- By:
- Publication type:
- Article
An Improved Contextual Advertising Matching Approach based on Wikipedia Knowledge.
- Published in:
- Computer Journal, 2012, v. 55, n. 3, p. 277
- By:
- Publication type:
- Article
Security and Privacy Challenges in SDN-Enabled IoT Systems: Causes, Proposed Solutions, and Future Directions.
- Published in:
- Computers, Materials & Continua, 2024, v. 80, n. 2, p. 2511, doi. 10.32604/cmc.2024.052994
- By:
- Publication type:
- Article
PLDH: Pseudo-Labels Based Deep Hashing.
- Published in:
- Mathematics (2227-7390), 2023, v. 11, n. 9, p. 2175, doi. 10.3390/math11092175
- By:
- Publication type:
- Article
Multimedia selection operation placement.
- Published in:
- Multimedia Tools & Applications, 2011, v. 54, n. 1, p. 69, doi. 10.1007/s11042-010-0528-9
- By:
- Publication type:
- Article
KIPTC: a kernel information propagation tag clustering algorithm.
- Published in:
- Journal of Intelligent Information Systems, 2015, v. 45, n. 1, p. 95, doi. 10.1007/s10844-013-0262-7
- By:
- Publication type:
- Article
The Protection of User Preference Privacy in Personalized Information Retrieval: Challenges and Overviews.
- Published in:
- Libri: International Journal of Libraries & Information Services, 2021, v. 71, n. 3, p. 227, doi. 10.1515/libri-2019-0140
- By:
- Publication type:
- Article
An Effective Approach for the Protection of User Privacy in a Digital Library.
- Published in:
- Libri: International Journal of Libraries & Information Services, 2019, v. 69, n. 4, p. 315, doi. 10.1515/libri-2018-0148
- By:
- Publication type:
- Article
Privacy-Guarding Optimal Route Finding with Support for Semantic Search on Encrypted Graph in Cloud Computing Scenario.
- Published in:
- Wireless Communications & Mobile Computing, 2021, p. 1, doi. 10.1155/2021/6617959
- By:
- Publication type:
- Article
An improved deep hashing model for image retrieval with binary code similarities.
- Published in:
- Journal of Big Data, 2024, v. 11, n. 1, p. 1, doi. 10.1186/s40537-024-00919-4
- By:
- Publication type:
- Article