Academic Journals Database
Disseminating quality controlled scientific knowledge

Search Articles for "Privacy"

ADD TO MY LIST
 
The Right to Be Forgotten

Author(s): Weber, Rolf H.
A RECENT REVIEW ON ASSOCIATION RULE MINING

Author(s): Maragatham G | Lakshmi M
Preserving the Privacy and Sharing the Data Using Classification on Perturbed Data

Author(s): B. V. HARITA | P.G.Chaitanya | R.L.Diwakar
Association Rule Hiding using Artificial Bee Colony Algorithm

Author(s): S.Vijayarani | M.Sathiya Prabha
Securing Bandwidth Request Messages in Wimax

Author(s): Kaushik Adhikary | Rajinder Kumar | Amit Kumar
The Effective and Efficient Security Services For Cloud Computing

Author(s): Sambhaji Sarode | Deepali Giri | Khushbu Chopde
Security Agents: A Mobile Agent Based Trust Model for Cloud Computing

Author(s): Priyank Singh Hada | Ranjita Singh | Mukul Manmohan
ANALYSIS OF DIFFERENT PRIVACY PRESERVING CLOUD STORAGE FRAMEWORKS

Author(s): Rajeev Bedi | Mohit Marwaha | Tajinder Singh | Harwinder Singh | Amritpal Singh
Format-compliant Privacy Protection of Traffic Surveillance Video using JPEG 2000

Author(s): Zhiguo Chang | Zhanwen Liu | Zongtao Duan | Jian Xu
BIOMETRICS BASED IDENTIFICATION TECHNIQUES (BIT)

Author(s): Akash Srivastva | Vedpal Singh
on Privacy Using User Anonymity And Dummy Locations

Author(s): Kusum Gupta, Ajay Singh Yadav and Shashank Yadav
Epidemiology of multi-resistant organisms – challenges to a regional data management system

Author(s): Gerlich, Miriam G. | Möller, Andreas | Schäfer, Christian | Strohbach, Anne-Kathrin | Krafczyk-Korth, Janina | Hoffmann, Wolfgang
Smart Card Security; Technology and Adoption

Author(s): Hamed Taherdoost | Shamsul Sahibuddin | Neda Jalaliyoon
Personal health care of internal medicine residents

Author(s): Venkataraman Palabindala | Paul Foster | Swetha Kanduri | Avanthi Doppalapudi | Amaleswari Pamarthy | Karthik Kovvuru
New Framework in Sensitive Rule Hiding

Author(s): A.S. NAVEENKUMAR | Dr. M. PUNITHAVALLI
Secret Key Agreement Over Multipath Channels Exploiting a Variable-Directional Antenna

Author(s): Valery Korzhik | Viktor Yakovlev | Yuri Kovajkin | Guillermo Morales-Luna
Effective Security Architecture for Virtualized Data Center Networks

Author(s): Udeze Chidiebele. C | Prof. H. C Inyiama | Okafor Kennedy .C | Dr C. C. Okezie
A study of intimate partner violence among females attending a Teaching Hospital out-patient department

Author(s): KALA Kuruppuarachchi | LT Wijeratne | GDSSK Weerasinghe | MUPK Peris | SS Williams
Survey on Recent Developments in Privacy Preserving Models

Author(s): Sowmyarani C N | Dr. G N Srinivasan
Data Mining for Knowledge Discovery from Imaging Reports

Author(s): Mahtab Karami | Reza Safdari | Soheila Refahi
A Web Service-Based Framework Model for People-Centric Sensing Applications Applied to Social Networking

Author(s): David Nunes | Thanh-Dien Tran | Duarte Raposo | André Pinto | André Gomes | Jorge Sá Silva
Cyber Threats In Social Networking Websites

Author(s): Wajeb Ghari | Maha Shaabi
Bluetooth Security Threats And Solutions: A Survey

Author(s): Nateq Be-Nazir Ibn Minar | Mohammed Tarique
Performance Evaluation of Wi-Fi comparison with WiMAX Networks

Author(s): M.Sreerama Murty | D.Veeraiah | A.Srinivas Rao
Protecting Privacy of Shared Epidemiologic Data without Compromising Analysis Potential

Author(s): John Cologne | Eric J. Grant | Eiji Nakashima | Yun Chen | Sachiyo Funamoto | Hiroaki Katayama
Applying a Model of Patient's Right in the State Hospital, Sari, Iran

Author(s): Ghasem Abedi | Layla Azimehr | Farideh Rostami | Samira Mohammadi
CANCELLABLE FACE BIOMETRICS USING IMAGE BLURRING

Author(s): HEMANTHA KUMAR G. and MANOJ KRISHNASWAMY
Evaluating the Impacts of Online Banking Factors on Motivating the Process of E-banking

Author(s): Akram Jalal | Jassim Marzooq | Hassan A. Nabi
An Efficient Method of Steganography using Matrix Approach

Author(s): Nirmalya Chowdhury | Puspita Manna
A MARKETING VIEW OVER THE ROLE OF THE PUBLIC AUTHORITIES IN THE PROTECTION OF THE CONSUMERS PRIVATE SPACE

Author(s): Veghes Calin | Acatrinei Carmen | Dugulan Diana | Palade Marius
Privacy Policy in E Government Websites: A Case Study of Saudi Arabia

Author(s): Sami M. Alhomod | Mohd Mudasir Shafi
A NOVEL METHOD FOR FINDING PRIVACY PRESERVING ASSOCIATION RULE MINING

Author(s): N V Muthu lakshmi | Dr. K Sandhya Rani
Semantic Massage Addressing based on Social Cloud Actor's Interests

Author(s): Reem M. Bahgat | Akram I. Salah | Hamada I. Abdul Wakeil
SPCS: Secure and Privacy-Preserving Charging-Station Searching using VANET

Author(s): Lucas Chi Kwong Hui | Victor On Kwok Li | Siu Ming Yiu | Tat Wing Chim | Jeanno Chin Long Cheung
Privacy Negotiation in Socio-Technical Systems

Author(s): Dinesh Verma | Murthy Rallapalli
Privacy Negotiation in Socio-Technical Systems

Author(s): Dinesh Verma | Murthy Rallapalli
THE INTERNET-BASED HEALTH INFORMATION AND ADOLESCENTS

Author(s): Biljana Kocić | Branislav Petrović
Security issues in Cloud Computing

Author(s): Kalyani D. Kadam | Sonia K. Gajre | R. L. Paikrao
Trust Model for Reliable File Exchange In Cloud Computing

Author(s): Edna Dias Canedo | Rafael Timoteo de Sousa Junior | Robson de Oliveira Albuquerque
Antiphishing Model with URL & Image based Webpage Matching

Author(s): Madhuri S. Arade | P.C. Bhaskar | R.K.Kamat
Mobile Viruses

Author(s): Pranav R Shah | Yash Shah | Saurabh Madan
Antiphishing Model with URL & Image based Webpage Matching

Author(s): Madhuri S. Arade | P.C. Bhaskar | R.K.Kamat
Fuzzy Associative Classifier for Distributed Mining

Author(s): B RaghuRam | Jayadev Gyani | B Hanmanthu
Survey of MAC Layer Protocols for vehicular Ad Hoc Network

Author(s): Vimal Bibhu | Dhirendra Kumar Singh
Privacy-Preserving Data Sharing Using Data Reconstruction Based Approach

Author(s): Kshitij Pathak | Narendra S. Chaudhari | Aruna Tiwari
PRIVACY AWARE MONITORING FRAMEWORK FOR MOVING TOP-K SPATIAL JOIN QUERIES

Author(s): U.L.Sindhu | V.Sindhu | P.S.Balamurugan
K-ANONYMITY: The History of an IDEA

Author(s): Swagatika Devi
La privacidad en programas televisivos: percepción de los adolescentes Intimacy in Television Programs: Adolescents’ Perception

Author(s): Concepción Medrano Samaniego | Ana Aierbe Barandiaran | Juan Ignacio Martínez de Morentín
Privacy protection for patients with substance use problems

Author(s): Hu LL | Sparenborg S | Tai B
Securing Mobile Agents in MANET against Attacks using Trust

Author(s): Chandreyee Chowdhury | Sarmistha Neogy
Implimentation of Cryptographic Algorithm for GSM and UMTS Systems.

Author(s): Alpesh R. Sankaliya | V.Mishra | Abhilash Mandloi
DREPTUL FUNDAMENTAL AL OMULUI LA UN MEDIU SĂNĂTOS ÎN JURISPRUDENŢA CEDO

Author(s): Petrică TRUŞCĂ | Andrada TRUŞCĂ TRANDAFIR
Experimental Study of Various Data Masking Techniques with Random Replacement using Data Volume

Author(s): Ravikumar G K | B. Justus Rabi | Ravindra S. Hegadi | Manjunath T.N | Archana R A
Efficient Cryptographic Technique for Securing and Accessing Outsourced Data

Author(s): Hasan Omar Al-Sakran | Fahad Bin Muhaya | Irina Serguievskaia
Hiding Sensitive XML Association Rules With Supervised Learning Technique

Author(s): Khalid Iqbal | Dr. Sohail Asghar | Dr. Abdulrehman Mirza
Recoverable Privacy Protection for Video Content Distribution

Author(s): Li Guangzhen | Ito Yoshimichi | Yu Xiaoyi | Nitta Naoko | Babaguchi Noboru
Compression Independent Reversible Encryption for Privacy in Video Surveillance

Author(s): Carrillo Paula | Kalva Hari | Magliveras Spyros
Enhancing Privacy Protection in Multimedia Systems

Author(s): Cheung Sen-chingSamson | Kundur Deepa | Senior Andrew
Anonymous Biometric Access Control

Author(s): Ye Shuiming | Luo Ying | Zhao Jian | Cheung Sen-ChingS
Improving the Security of CardSpace

Author(s): Alrodhan WaleedA | Mitchell ChrisJ
Video Data Hiding for Managing Privacy Information in Surveillance Systems

Author(s): Paruchuri JithendraK | Cheung Sen-chingS | Hail MichaelW
PKIS: practical keyword index search on cloud datacenter

Author(s): Park Hyun-A | Park Jae Hyun | Lee Dong Hoon
An efficient and secure anonymous authentication scheme for mobile satellite communication systems

Author(s): Yoon Eun-Jun | Yoo Kee-Young | Hong Jeong-Woo | Yoon Sang-Yoon | Park Dong-In | Choi Myung-Jin
A survey on biometric cryptosystems and cancelable biometrics

Author(s): Rathgeb Christian | Uhl Andreas
Architecture of a consent management suite and integration into IHE-based regional health information networks

Author(s): Heinze Oliver | Birkle Markus | Köster Lennart | Bergh Björn
Emergency department triage: an ethical analysis

Author(s): Aacharya Ramesh | Gastmans Chris | Denier Yvonne
HOP: Achieving Efficient Anonymity in MANETs by Combining HIP, OLSR, and Pseudonyms

Author(s): Campos Javier | Calafate CarlosT | Nácher Marga | Manzoni Pietro | Cano Juan-Carlos
A Salient Missing Link in RFID Security Protocols

Author(s): Erguler Imran | Anarim Emin | Saldamli Gokay
Young people's views on the potential use of telemedicine consultations for sexual health: results of a national survey

Author(s): Garrett Cameryn | Hocking Jane | Chen Marcus | Fairley Christopher | Kirkman Maggie
SPM: Source Privacy for Mobile Ad Hoc Networks

Author(s): Ren Jian | Li Yun | Li Tongtong
Tools for Protecting the Privacy of Specific Individuals in Video

Author(s): Chen Datong | Chang Yi | Yan Rong | Yang Jie
Unvoiced Speech Recognition Using Tissue-Conductive Acoustic Sensor

Author(s): Heracleous Panikos | Kaino Tomomi | Saruwatari Hiroshi | Shikano Kiyohiro
Secure and Efficient Protocol for Vehicular Ad Hoc Network with Privacy Preservation

Author(s): Choi Hyoung-Kee | Kim In-Hwan | Yoo Jae-Chern
The Design of an Electronic Voting System

Author(s): G.O. Ofori-Dwumfuo | E. Paatey
A Receiptfree MultiAuthority EVoting System

Author(s): Adewole A. Philip | Sodiya Adesina Simon | Arowolo Oluremi. A.
HYBRID MODEL FOR SECURING E-COMMERCE TRANSACTION

Author(s): Abdul Monem S. Rahma | Rabah N. Farhan | Hussam J. Mohammad
Youthful Lust and Violation of Mobile Phone Rule in a Private Christian Mission University, South West Nigeria

Author(s): Omonijo Dare Ojo | Nnedum Obiajulu Anthony Ugochukwu | Ezeokana Jude Obinna
Patients’ privacy: a literature review

Author(s): Mehrdad N | Parsa Yekta Z | Jolaee S
Nurses and Inpatient Adolescents' perceptions on Observance of privacy and its Importance

Author(s): R Karimi(MSc.) | N Dehghan Nayeri (Ph.D) | Z Daneshvar Ameri (MSc.) | A Mehran(MSc.) | T Sadeghi (MSc.)
BOOK REVIEW

Author(s): Rohna Ridzwan
Affiliate Program      Why do you need a reservation system?