58   Artículos

 
en línea
Jun Li, Chenyang Zhang, Jianyi Zhang and Yanhua Shao    
To address the challenge of balancing privacy protection with regulatory oversight in blockchain transactions, we propose a regulatable privacy protection scheme for blockchain transactions. Our scheme utilizes probabilistic public-key encryption to obsc... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Xingchen Wang and Peng Li    
With the widespread adoption of cloud computing, the face verification process often requires the client to upload the face to an untrusted cloud server to obtain the verification results. Privacy leakage issues may arise if the client?s private informat... ver más
Revista: Information    Formato: Electrónico

 
en línea
Zeming Wei, Jiawen Fang, Zhicheng Hong, Yu Zhou, Shansi Ma, Junlang Zhang, Chufeng Liang, Gansen Zhao and Hua Tang    
Blockchain is a distributed ledger technology that possesses characteristics such as decentralization, tamper resistance, and programmability. However, while blockchain ensures transaction openness and transparency, transaction privacy is also at risk of... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Xin Liao and Khoi D. Hoang    
Distributed Constraint Optimization Problems (DCOPs) are an efficient framework widely used in multi-agent collaborative modeling. The traditional DCOP framework assumes that variables are discrete and constraint utilities are represented in tabular form... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Shunfang Hu, Shaoping Jiang, Qing Miao, Fan Yang, Weihong Zhou and Peng Duan    
With the rise of the Internet of Things (IoT), maintaining data confidentiality and protecting user privacy have become increasingly challenging. End devices in the IoT are often deployed in unattended environments and connected to open networks, making ... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Yang Yang and Guanghua Song    
Outsourcing computation has become increasingly popular due to its cost-effectiveness, enabling users with limited resources to conduct large-scale computations on potentially untrusted cloud platforms. In order to safeguard privacy, verifiable computing... ver más
Revista: Information    Formato: Electrónico

 
en línea
Bin Cheng, Ping Chen, Xin Zhang, Keyu Fang, Xiaoli Qin and Wei Liu    
With the rapid development of ubiquitous data collection and data analysis, data privacy in a recommended system is facing more and more challenges. Differential privacy technology can provide strict privacy protection while reducing the risk of privacy ... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Liping Zhang, Jing Li and Song Li    
A new spatial keyword group query method is proposed in this paper to address the existing issue of user privacy leakage and exclusion of preferences in road networks. The proposed query method is based on the IGgram-tree index and minimum hash set. To d... ver más
Revista: ISPRS International Journal of Geo-Information    Formato: Electrónico

 
en línea
Nigang Sun, Chenyang Zhu, Yuanyi Zhang and Yining Liu    
Digital transformation of the logistics industry triggered by the widespread use of Internet of Things (IoT) technology has prompted a significant revolution in logistics companies, further bringing huge dividends to society. However, the concurrent acce... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Mohit Kumar, Bernhard A. Moser, Lukas Fischer and Bernhard Freudenthaler    
In order to develop machine learning and deep learning models that take into account the guidelines and principles of trustworthy AI, a novel information theoretic approach is introduced in this article. A unified approach to privacy-preserving interpret... ver más
Revista: Algorithms    Formato: Electrónico

« Anterior     Página: 1 de 4     Siguiente »