Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Taxonomy for Privacy Policies of Social Networks Sites
(Articles)
Sergio Donizetti Zorzo
,
Rodrigo Pereira Botelho
,
Paulo Muniz de Ávila
Social Networking
Vol.2 No.4
,October 30, 2013
DOI:
10.4236/sn.2013.24015
5,365
Downloads
9,867
Views
Citations
Multi-Dimensional Anonymization for Participatory Sensing Systems
(Articles)
Nafeez Abrar
,
Shaolin Zaman
,
Anindya Iqbal
,
Manzur Murshed
Int'l J. of Communications, Network and System Sciences
Vol.13 No.6
,June 30, 2020
DOI:
10.4236/ijcns.2020.136006
284
Downloads
822
Views
Citations
A Systematic Survey for Differential Privacy Techniques in Federated Learning
(Articles)
Yi Zhang
,
Yunfan Lu
,
Fengxia Liu
Journal of Information Security
Vol.14 No.2
,February 28, 2023
DOI:
10.4236/jis.2023.142008
719
Downloads
3,015
Views
Citations
This article belongs to the Special Issue on
Cybersecurity and Information Security
When Corporal Acts Are Labeled Criminal: Lack of Privacy among the Homeless
(Articles)
Matthew R. Taylor
,
Eileen T. Walsh
Sociology Mind
Vol.8 No.2
,April 3, 2018
DOI:
10.4236/sm.2018.82011
1,308
Downloads
5,020
Views
Citations
Utility-Based Anonymization Using Generalization Boundaries to Protect Sensitive Attributes
(Articles)
Abou-el-ela Abdou Hussien
,
Nagy Ramadan Darwish
,
Hesham A. Hefny
Journal of Information Security
Vol.6 No.3
,June 15, 2015
DOI:
10.4236/jis.2015.63019
4,778
Downloads
5,666
Views
Citations
Predicting Users Mobile App Privacy Preferences
(Articles)
Aziz Alshehri
,
Fayez Alotaibi
Journal of Computer and Communications
Vol.7 No.10
,October 22, 2019
DOI:
10.4236/jcc.2019.710014
500
Downloads
1,445
Views
Citations
Cloud-Based Access Control to Preserve Privacy in Academic Web Application
(Articles)
Aljwhrh Almtrf
,
Mohamed Zohdy
Journal of Computer and Communications
Vol.7 No.12
,December 16, 2019
DOI:
10.4236/jcc.2019.712005
682
Downloads
1,667
Views
Citations
Hierarchical Production of Privacy: Gating in Compact Living in Hong Kong
(Articles)
Jun Wang
,
Stephen S. Y. Lau
Current Urban Studies
Vol.1 No.2
,June 13, 2013
DOI:
10.4236/cus.2013.12002
4,738
Downloads
8,661
Views
Citations
Privacy Preserving Two-Party Hierarchical Clustering Over Vertically Partitioned Dataset
(Articles)
Animesh Tripathy
,
Ipsa De
Journal of Software Engineering and Applications
Vol.6 No.5B
,October 12, 2013
DOI:
10.4236/jsea.2013.65B006
3,554
Downloads
5,156
Views
Citations
Privacy of Wearable Electronics in the Healthcare and Childcare Sectors: A Survey of Personal Perspectives from Finland and the United Kingdom
(Articles)
Johanna Virkki
,
Rebecca Aggarwal
Journal of Information Security
Vol.5 No.2
,March 17, 2014
DOI:
10.4236/jis.2014.52005
4,663
Downloads
7,392
Views
Citations
“A Person Is a Person through Other Persons”—A Critical Analysis of Privacy and Culture in Africa
(Articles)
Alex B. Makulilo
Beijing Law Review
Vol.7 No.3
,August 22, 2016
DOI:
10.4236/blr.2016.73020
3,056
Downloads
7,240
Views
Citations
Toward Secure Vehicular Ad Hoc Networks an Overview and Comparative Study
(Articles)
Yousef Al-Raba’nah
,
Mohammed Al-Refai
Journal of Computer and Communications
Vol.4 No.16
,December 9, 2016
DOI:
10.4236/jcc.2016.416002
2,101
Downloads
4,089
Views
Citations
Privacy Protection in COVID Data Tracking: Textual Analysis of the Literature
(Articles)
Antonella Massari
,
Viviana D’Addosio
,
Vittoria Claudia De Nicolò
,
Samuela L’Abbate
Applied Mathematics
Vol.15 No.3
,March 29, 2024
DOI:
10.4236/am.2024.153013
84
Downloads
273
Views
Citations
Attacks on Anonymization-Based Privacy-Preserving: A Survey for Data Mining and Data Publishing
(Articles)
Abou-el-ela Abdou Hussien
,
Nermin Hamza
,
Hesham A. Hefny
Journal of Information Security
Vol.4 No.2
,April 23, 2013
DOI:
10.4236/jis.2013.42012
8,724
Downloads
14,958
Views
Citations
Web Search Query Privacy, an End-User Perspective
(Articles)
Kato Mivule
Journal of Information Security
Vol.8 No.1
,January 17, 2017
DOI:
10.4236/jis.2017.81005
1,916
Downloads
4,540
Views
Citations
A Privacy Enabled Fast Dynamic Authentication and Authorization for B3G/4G Mobility
(Articles)
Zhikui CHEN
,
Song YANG
Communications and Network
Vol.1 No.2
,December 1, 2009
DOI:
10.4236/cn.2009.12012
6,595
Downloads
10,403
Views
Citations
Secured Electronic Voting Protocol Using Biometric Authentication
(Articles)
Kalaichelvi Visvalingam
,
R. M. Chandrasekaran
Advances in Internet of Things
Vol.1 No.2
,July 26, 2011
DOI:
10.4236/ait.2011.12006
10,783
Downloads
24,368
Views
Citations
Privacy Preserving Scheme for Location-Based Services
(Articles)
Youssef Gahi
,
Mouhcine Guennoun
,
Zouhair Guennoun
,
Khalil El-Khatib
Journal of Information Security
Vol.3 No.2
,April 26, 2012
DOI:
10.4236/jis.2012.32013
6,076
Downloads
12,025
Views
Citations
Regulatory Privacy Protection for Biomedical Cloud Computing
(Articles)
Y. Tony Yang
,
Kari Borg
Beijing Law Review
Vol.3 No.4
,December 13, 2012
DOI:
10.4236/blr.2012.34020
4,782
Downloads
8,075
Views
Citations
Personal Perspectives: Individual Privacy in the IOT
(Articles)
Johanna Virkki
,
Liquan Chen
Advances in Internet of Things
Vol.3 No.2
,April 30, 2013
DOI:
10.4236/ait.2013.32003
6,327
Downloads
13,252
Views
Citations
<
1
2
3
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top