Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journals
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Publication Date:
📅
--📅
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Taxonomy for Privacy Policies of Social Networks Sites
(Articles)
Sergio Donizetti Zorzo
,
Rodrigo Pereira Botelho
,
Paulo Muniz de Ávila
Social Networking
Vol.2 No.4
, October 30, 2013
DOI:
10.4236/sn.2013.24015
5,573
Downloads
10,408
Views
Citations
Multi-Dimensional Anonymization for Participatory Sensing Systems
(Articles)
Nafeez Abrar
,
Shaolin Zaman
,
Anindya Iqbal
,
Manzur Murshed
International Journal of Communications, Network and System Sciences
Vol.13 No.6
, June 30, 2020
DOI:
10.4236/ijcns.2020.136006
389
Downloads
1,186
Views
Citations
A Systematic Survey for Differential Privacy Techniques in Federated Learning
(Articles)
Yi Zhang
,
Yunfan Lu
,
Fengxia Liu
Journal of Information Security
Vol.14 No.2
, February 28, 2023
DOI:
10.4236/jis.2023.142008
1,055
Downloads
5,161
Views
Citations
This article belongs to the Special Issue on
Cybersecurity and Information Security
To Preserve Privacy for Smart Home Security System in Cloud Computing
(Articles)
Depeng Li
Journal of Information Security
Vol.17 No.1
, January 14, 2026
DOI:
10.4236/jis.2026.171002
65
Downloads
263
Views
Citations
When Corporal Acts Are Labeled Criminal: Lack of Privacy among the Homeless
(Articles)
Matthew R. Taylor
,
Eileen T. Walsh
Sociology Mind
Vol.8 No.2
, April 3, 2018
DOI:
10.4236/sm.2018.82011
1,461
Downloads
5,657
Views
Citations
Utility-Based Anonymization Using Generalization Boundaries to Protect Sensitive Attributes
(Articles)
Abou-el-ela Abdou Hussien
,
Nagy Ramadan Darwish
,
Hesham A. Hefny
Journal of Information Security
Vol.6 No.3
, June 15, 2015
DOI:
10.4236/jis.2015.63019
4,938
Downloads
6,100
Views
Citations
Predicting Users Mobile App Privacy Preferences
(Articles)
Aziz Alshehri
,
Fayez Alotaibi
Journal of Computer and Communications
Vol.7 No.10
, October 22, 2019
DOI:
10.4236/jcc.2019.710014
620
Downloads
1,913
Views
Citations
Cloud-Based Access Control to Preserve Privacy in Academic Web Application
(Articles)
Aljwhrh Almtrf
,
Mohamed Zohdy
Journal of Computer and Communications
Vol.7 No.12
, December 16, 2019
DOI:
10.4236/jcc.2019.712005
791
Downloads
2,103
Views
Citations
A Metric for Calculating the Extent of Non-Knowledge (Level) of Personal Privacy
(Articles)
Yair Oppenheim
Open Access Library Journal
Vol.12 No.5
, May 31, 2025
DOI:
10.4236/oalib.1113554
51
Downloads
284
Views
Citations
Hierarchical Production of Privacy: Gating in Compact Living in Hong Kong
(Articles)
Jun Wang
,
Stephen S. Y. Lau
Current Urban Studies
Vol.1 No.2
, June 13, 2013
DOI:
10.4236/cus.2013.12002
5,022
Downloads
9,208
Views
Citations
Privacy Preserving Two-Party Hierarchical Clustering Over Vertically Partitioned Dataset
(Articles)
Animesh Tripathy
,
Ipsa De
Journal of Software Engineering and Applications
Vol.6 No.5B
, October 12, 2013
DOI:
10.4236/jsea.2013.65B006
3,720
Downloads
5,569
Views
Citations
Privacy of Wearable Electronics in the Healthcare and Childcare Sectors: A Survey of Personal Perspectives from Finland and the United Kingdom
(Articles)
Johanna Virkki
,
Rebecca Aggarwal
Journal of Information Security
Vol.5 No.2
, March 17, 2014
DOI:
10.4236/jis.2014.52005
4,896
Downloads
7,906
Views
Citations
“A Person Is a Person through Other Persons”—A Critical Analysis of Privacy and Culture in Africa
(Articles)
Alex B. Makulilo
Beijing Law Review
Vol.7 No.3
, August 22, 2016
DOI:
10.4236/blr.2016.73020
3,295
Downloads
8,437
Views
Citations
Toward Secure Vehicular Ad Hoc Networks an Overview and Comparative Study
(Articles)
Yousef Al-Raba’nah
,
Mohammed Al-Refai
Journal of Computer and Communications
Vol.4 No.16
, December 9, 2016
DOI:
10.4236/jcc.2016.416002
2,223
Downloads
4,643
Views
Citations
Privacy Protection in COVID Data Tracking: Textual Analysis of the Literature
(Articles)
Antonella Massari
,
Viviana D’Addosio
,
Vittoria Claudia De Nicolò
,
Samuela L’Abbate
Applied Mathematics
Vol.15 No.3
, March 29, 2024
DOI:
10.4236/am.2024.153013
220
Downloads
619
Views
Citations
Attacks on Anonymization-Based Privacy-Preserving: A Survey for Data Mining and Data Publishing
(Articles)
Abou-el-ela Abdou Hussien
,
Nermin Hamza
,
Hesham A. Hefny
Journal of Information Security
Vol.4 No.2
, April 23, 2013
DOI:
10.4236/jis.2013.42012
9,107
Downloads
15,955
Views
Citations
Web Search Query Privacy, an End-User Perspective
(Articles)
Kato Mivule
Journal of Information Security
Vol.8 No.1
, January 17, 2017
DOI:
10.4236/jis.2017.81005
2,059
Downloads
5,173
Views
Citations
Anonymity in the Age of AI
(Articles)
Parisasadat Shojaei
,
Nabi Zameni
,
Rezza Moieni
Open Journal of Social Sciences
Vol.13 No.8
, August 5, 2025
DOI:
10.4236/jss.2025.138004
81
Downloads
695
Views
Citations
This article belongs to the Special Issue on
AI Evolution: Trends, Challenges, and Opportunities
A Privacy Enabled Fast Dynamic Authentication and Authorization for B3G/4G Mobility
(Articles)
Zhikui CHEN
,
Song YANG
Communications and Network
Vol.1 No.2
, December 1, 2009
DOI:
10.4236/cn.2009.12012
6,761
Downloads
10,791
Views
Citations
Secured Electronic Voting Protocol Using Biometric Authentication
(Articles)
Kalaichelvi Visvalingam
,
R. M. Chandrasekaran
Advances in Internet of Things
Vol.1 No.2
, July 26, 2011
DOI:
10.4236/ait.2011.12006
11,047
Downloads
25,625
Views
Citations
First
<
1
2
3
...
>
Last
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
News
About SCIRP
Ethics
Editorial Policies
For Authors
Peer-Review Issues
Publication Fees
Special Issues
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2026 Scientific Research Publishing Inc. All Rights Reserved.
Top