全部文献期刊会议图书|学者科研项目
中外文文献  中文文献  外文文献
作者:Hai Liu , Zhenqiang Wu , Changgen Peng ...
来源:[J].Theoretical Computer Science(IF 0.489), 2020, Vol.816, pp.195-220
摘要:Abstract(#br)Differential privacy can achieve the tradeoff between privacy and utility by using privacy metric and utility metric. However, since privacy metric and utility metric may not be bounded, differential privacy can not provide the bounded tradeoff. Moreover, there is no...
作者:Byungwan Koh , Srinivasan Raghunathan , Barrie R. Nault
来源:[J].Decision Support Systems(IF 2.201), 2020
摘要:... Further, surveys and literature show that many customers are not comfortable with firms collecting their information due to privacy concerns. A vast literature has examined customer information disclosing behavior using the privacy calculus. The primary premise of the privacy...
作者:Takako Takai-Igarashi , Kengo Kinoshita , Masao Nagasaki ...
来源:[J].BMC Medical Informatics and Decision Making(IF 1.603), 2017, Vol.17 (1)Springer
摘要:... Such a large-scale of data integration involves obvious risks of privacy violation. The research use of personal genome and health information is a topic of global discussion with regard to the protection of privacy while promoting scientific advancement. The present paper re...
作者:Frederik Temmermans , Touradj Ebrahimi , Siegfried Foessel ...
来源:[J].EURASIP Journal on Image and Video Processing(IF 0.57), 2017, Vol.2017 (1)Springer
摘要:Current image coding standards provide limited support for privacy and security features. An exception is the JPSEC standard, which defines security extensions in JPEG 2000 specifications (part 8). Notwithstanding this shortcoming, the JPEG committee is currently defining a new J...
作者:Zhiyu Wan , Yevgeniy Vorobeychik , Murat Kantarcioglu ...
来源:[J].BMC Medical Genomics(IF 3.466), 2017, Vol.10 (2)Springer
摘要:... The Integrating Data for Analysis, Anonymization, and Sharing (iDASH) Center modeled a track in their third Privacy Protection Challenge on how to mitigate the Beacon vulnerability. We developed the winning solution for this track.
作者:Francois-André Allaert , Noël-Jean Mazen , Louis Legrand ...
来源:[J].BMC Medical Informatics and Decision Making(IF 1.603), 2017, Vol.17 (1)Springer
摘要:The market for Connected Health Devices (CHD) with healthcare applications is growing fast and should be worth several billion euros in turnover in the coming years. Their development will completely transform the organisation of our healthcare system, profoundly change the way p...
作者:P. Saha-Chaudhuri , C.R. Weinberg
来源:[J].BMC Medical Research Methodology(IF 2.211), 2017, Vol.17 (1)Springer
摘要:Data confidentiality and shared use of research data are two desirable but sometimes conflicting goals in research with multi-center studies and distributed data. While ideal for straightforward analysis, confidentiality restrictions forbid creation of a single dataset that inclu...
作者:Hao Wang , Guangjie Han , Chunsheng Zhu ...
来源:[J].Future Generation Computer Systems(IF 1.864), 2020, Vol.107, pp.965-974
摘要:... Source Location Privacy (SLP) protection is an essential problem in security. To enhance SLP in WSNs, in this paper, we propose a trace cost based source location privacy protection scheme (TCSLP) in WSNs for smart cities. First, we construct a phantom area to position phanto...
作者:Yang Lu , Minghui Zhu
来源:[J].Automatica(IF 2.919), 2020, Vol.115
摘要:... In this paper, we propose to intentionally perturb the inputs and outputs of a linear dynamic system to protect the privacy of target initial states and inputs from released outputs. We formulate the problem of perturbation design as an optimization problem which minimizes...
作者:Qin Wang , Bo Qin , Jiankun Hu ...
来源:[J].Future Generation Computer Systems(IF 1.864), 2020, Vol.107, pp.793-804
摘要:... Our framework achieves delicate anonymity and prevents active and passive attacks, which effectively improves the transaction privacy. Analyses show that our proposal is secure and practical.

我们正在为您处理中,这可能需要一些时间,请稍等。

资源合作:cnki.scholar@cnki.net, +86-10-82896619   意见反馈:scholar@cnki.net

×