Qu et al., 2021 - Google Patents
Personalized privacy protection solutionsQu et al., 2021
- Document ID
- 16023230132662875456
- Author
- Qu Y
- Nosouhi M
- Cui L
- Yu S
- Publication year
- Publication venue
- Personalized Privacy Protection in Big Data
External Links
Snippet
Personalized Privacy Protection Solutions | SpringerLink Skip to main content Advertisement
Springer Nature Link Account Menu Find a journal Publish with us Track your research Search
Cart 1.Home 2.Personalized Privacy Protection in Big Data 3.Chapter Personalized Privacy …
- 230000004224 protection 0 title abstract description 223
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0407—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W4/00—Mobile application services or facilities specially adapted for wireless communication networks
- H04W4/20—Signalling of application services or auxiliary data signalling, i.e. transmitting data via a non-traffic channel
- H04W4/206—Signalling of application services or auxiliary data signalling, i.e. transmitting data via a non-traffic channel for socializing or targeting users of the same wireless application service, e.g. joint gesture signalling or mobile advertising signalling
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Yahuza et al. | Systematic review on security and privacy requirements in edge computing: State of the art and future research opportunities | |
Alfandi et al. | A survey on boosting IoT security and privacy through blockchain: Exploration, requirements, and open issues | |
Istiaque Ahmed et al. | Machine learning for authentication and authorization in iot: Taxonomy, challenges and future research direction | |
Sadhu et al. | Internet of things: Security and solutions survey | |
Din et al. | Trust management techniques for the Internet of Things: A survey | |
Turner et al. | A promising integration of sdn and blockchain for iot networks: A survey | |
Khaliq et al. | A secure and privacy preserved parking recommender system using elliptic curve cryptography and local differential privacy | |
Wang et al. | STAMP: Enabling privacy-preserving location proofs for mobile users | |
Dwivedi et al. | Smart contract and IPFS-based trustworthy secure data storage and device authentication scheme in fog computing environment | |
Zahra et al. | A generic and lightweight security mechanism for detecting malicious behavior in the uncertain Internet of Things using fuzzy logic-and fog-based approach | |
Bandara et al. | Skunk—A blockchain and zero trust security enabled federated learning platform for 5G/6G network slicing | |
Khan et al. | Quantum anonymous private information retrieval for distributed networks | |
Sai et al. | A survey on privacy issues in mobile social networks | |
Chang et al. | Protecting mobile crowd sensing against sybil attacks using cloud based trust management system | |
Ghonge et al. | Cyber security and digital forensics: challenges and future trends | |
de Oliveira et al. | An access control for IoT based on network community perception and social trust against Sybil attacks | |
Gao et al. | Privacy-preserving in edge computing | |
Park et al. | PoAh-enabled federated learning architecture for DDoS attack detection in IoT networks | |
Qu et al. | Personalized privacy protection solutions | |
Sandeepa et al. | Federated Learning for 6G Networks: Navigating Privacy Benefits and Challenges | |
Hamza et al. | A social qualitative trust framework for Fog computing | |
Raza et al. | Blockchain-based reputation and trust management for smart grids, healthcare, and transportation: a review | |
Baskaran et al. | A secured authentication and DSM‐KL ascertained performance optimization of a hybrid block chain‐enabled framework for a multiple WSN | |
Kelly | A taxonomy for and analysis of anonymous communications networks | |
Zhou et al. | Stor: Social network based anonymous communication in tor |