[go: up one dir, main page]

Melnyk et al., 2023 - Google Patents

Protection of data transmission in remote monitoring tools by anonymization.

Melnyk et al., 2023

View PDF
Document ID
11493730497128430697
Author
Melnyk A
Le Boudec J
Morozov Y
Havano B
Hupalo P
Publication year
Publication venue
IntelITSIS

External Links

Snippet

Data anonymization is a method of removing or encrypting personal data in a data set. At the same time, the existing data structure is maintained for further data analysis. The purpose of anonymization is to ensure the confidentiality of the subject's information. This paper …
Continue reading at ceur-ws.org (PDF) (other versions)

Similar Documents

Publication Publication Date Title
Bhatia et al. Data security in mobile cloud computing paradigm: a survey, taxonomy and open research issues
US11626976B2 (en) Information processing system, information processing device, information processing method and information processing program
Nagaraju et al. Trusted framework for online banking in public cloud using multi-factor authentication and privacy protection gateway
Vladimirov et al. Security and privacy protection obstacles with 3D reconstructed models of people in applications and the metaverse: A survey
US20130061298A1 (en) Authenticating session passwords
KR102549337B1 (en) Systems and methods for biometric protocol standards
Griffin Telebiometric authentication objects
Vegesna Investigations on different security techniques for data protection in cloud computing using cryptography schemes
Arias-Cabarcos et al. Comparing password management software: toward usable and secure enterprise authentication
US11245684B2 (en) User enrollment and authentication across providers having trusted authentication and identity management services
Tutubala et al. A hybrid framework to improve data security in cloud computing
Fahl et al. Trustsplit: usable confidentiality for social network messaging
Thompson et al. Multifactor IoT Authentication System for Smart Homes Using Visual Cryptography, Digital Memory, and Blockchain Technologies
Alibasa et al. Designing a secure architecture for m-health applications
Rastogi et al. Secured identity management system for preserving data privacy and transmission in cloud computing
WO2024026428A1 (en) Digital identity allocation, assignment, and management
Binu et al. A mobile based remote user authentication scheme without verifier table for cloud based services
Melnyk et al. Protection of biometric data transmission and storage in the human state remote monitoring tools
Bhargav-Spantzel TRUSTED EXECUTION ENVIRONMENT FOR PRIVACY PRESERVING BIOMETRIC AUTHENTICATION.
Melnyk et al. Protection of data transmission in remote monitoring tools by anonymization.
Li Context-aware attribute-based techniques for data security and access control in mobile cloud environment
Kim et al. Secure user authentication based on the trusted platform for mobile devices
Gagged et al. Improved secure dynamic bit standard technique for a private cloud platform to address security challenges
WITTI et al. Secure and privacy-aware data collection architecture approach in fog node based distributed IoT environment
CN110490003B (en) User trusted data generation method, user trusted data acquisition method, device and system