Melnyk et al., 2023 - Google Patents
Protection of data transmission in remote monitoring tools by anonymization.Melnyk et al., 2023
View PDF- Document ID
- 11493730497128430697
- Author
- Melnyk A
- Le Boudec J
- Morozov Y
- Havano B
- Hupalo P
- Publication year
- Publication venue
- IntelITSIS
External Links
Snippet
Data anonymization is a method of removing or encrypting personal data in a data set. At the same time, the existing data structure is maintained for further data analysis. The purpose of anonymization is to ensure the confidentiality of the subject's information. This paper …
- 238000012544 monitoring process 0 title abstract description 32
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Bhatia et al. | Data security in mobile cloud computing paradigm: a survey, taxonomy and open research issues | |
US11626976B2 (en) | Information processing system, information processing device, information processing method and information processing program | |
Nagaraju et al. | Trusted framework for online banking in public cloud using multi-factor authentication and privacy protection gateway | |
Vladimirov et al. | Security and privacy protection obstacles with 3D reconstructed models of people in applications and the metaverse: A survey | |
US20130061298A1 (en) | Authenticating session passwords | |
KR102549337B1 (en) | Systems and methods for biometric protocol standards | |
Griffin | Telebiometric authentication objects | |
Vegesna | Investigations on different security techniques for data protection in cloud computing using cryptography schemes | |
Arias-Cabarcos et al. | Comparing password management software: toward usable and secure enterprise authentication | |
US11245684B2 (en) | User enrollment and authentication across providers having trusted authentication and identity management services | |
Tutubala et al. | A hybrid framework to improve data security in cloud computing | |
Fahl et al. | Trustsplit: usable confidentiality for social network messaging | |
Thompson et al. | Multifactor IoT Authentication System for Smart Homes Using Visual Cryptography, Digital Memory, and Blockchain Technologies | |
Alibasa et al. | Designing a secure architecture for m-health applications | |
Rastogi et al. | Secured identity management system for preserving data privacy and transmission in cloud computing | |
WO2024026428A1 (en) | Digital identity allocation, assignment, and management | |
Binu et al. | A mobile based remote user authentication scheme without verifier table for cloud based services | |
Melnyk et al. | Protection of biometric data transmission and storage in the human state remote monitoring tools | |
Bhargav-Spantzel | TRUSTED EXECUTION ENVIRONMENT FOR PRIVACY PRESERVING BIOMETRIC AUTHENTICATION. | |
Melnyk et al. | Protection of data transmission in remote monitoring tools by anonymization. | |
Li | Context-aware attribute-based techniques for data security and access control in mobile cloud environment | |
Kim et al. | Secure user authentication based on the trusted platform for mobile devices | |
Gagged et al. | Improved secure dynamic bit standard technique for a private cloud platform to address security challenges | |
WITTI et al. | Secure and privacy-aware data collection architecture approach in fog node based distributed IoT environment | |
CN110490003B (en) | User trusted data generation method, user trusted data acquisition method, device and system |