-
1
Unix Domain Sockets Applied in Android Malware Should Not Be Ignored
Published 2018-03-01Subjects: Get full text
Article -
2
Calibrating Noise to Sensitivity in Private Data Analysis
Published 2017-05-01Subjects: “…private data analysis…”
Get full text
Article -
3
THE ANALYSIS AND GENERALIZATION AVAILABLE APPROACHES OF CLASSIFICATION OF THREATS FOR PRIVATE DATA’S SAFETY
Published 2022-05-01Subjects: Get full text
Article -
4
Private Data Acquisition Method Based on System-Level Data Migration and Volatile Memory Forensics for Android Applications
Published 2019-01-01Subjects: “…Android private data acquisition…”
Get full text
Article -
5
RETRACTED ARTICLE: Research on privacy and secure storage protection of personalized medical data based on hybrid encryption
Published 2024-01-01Subjects: Get full text
Article -
6
TABE-DAC: Efficient Traceable Attribute-Based Encryption Scheme With Dynamic Access Control Based on Blockchain
Published 2021-01-01Subjects: Get full text
Article -
7
Local differential privacy and its applications: a comprehensive survey
Published 2024Subjects: Get full text
Journal Article -
8
Traceability Model of Plantation Agricultural Products Based on Blockchain and InterPlanetary File System
Published 2023-12-01Subjects: Get full text
Article -
9
-
10
Efficient Q-Value Zero-Leakage Protection Scheme in SRS Regularly Publishing Private Data
Published 2019-01-01Subjects: “…regularly publishing private data…”
Get full text
Article -
11
Privacy and Utility of Private Synthetic Data for Medical Data Analyses
Published 2022-12-01Subjects: Get full text
Article -
12
Ethical considerations in the use of big data for business analytics: а cross-industry perspective
Published 2023-12-01Subjects: Get full text
Article -
13
Collaborative Data Use between Private and Public Stakeholders—A Regional Case Study
Published 2022-01-01Subjects: Get full text
Article -
14
ASIGURAREA PROTECȚIEI JURIDICO-PENALE A SECRETULUI PROFESIONAL ÎN LEGEA PENALĂ A ROMÂNIEI ȘI ÎN CEA A REPUBLICII MOLDOVA: STUDIU EMPIRIC
Published 2020-09-01Subjects: “…professional secret, privacy secret, data confidentiality, personal data, originated secret, primary secret, private interest, private data protection, professional statute.…”
Get full text
Article -
15
-
16
Simulation modeling of organization's infosecurity dependence on field of activity
Published 2017-12-01Subjects: Get full text
Article