[go: up one dir, main page]

Qu et al., 2021 - Google Patents

Personalized privacy protection solutions

Qu et al., 2021

Document ID
16023230132662875456
Author
Qu Y
Nosouhi M
Cui L
Yu S
Publication year
Publication venue
Personalized Privacy Protection in Big Data

External Links

Snippet

Personalized Privacy Protection Solutions | SpringerLink Skip to main content Advertisement Springer Nature Link Account Menu Find a journal Publish with us Track your research Search Cart 1.Home 2.Personalized Privacy Protection in Big Data 3.Chapter Personalized Privacy …
Continue reading at link.springer.com (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W4/00Mobile application services or facilities specially adapted for wireless communication networks
    • H04W4/20Signalling of application services or auxiliary data signalling, i.e. transmitting data via a non-traffic channel
    • H04W4/206Signalling of application services or auxiliary data signalling, i.e. transmitting data via a non-traffic channel for socializing or targeting users of the same wireless application service, e.g. joint gesture signalling or mobile advertising signalling

Similar Documents

Publication Publication Date Title
Yahuza et al. Systematic review on security and privacy requirements in edge computing: State of the art and future research opportunities
Alfandi et al. A survey on boosting IoT security and privacy through blockchain: Exploration, requirements, and open issues
Istiaque Ahmed et al. Machine learning for authentication and authorization in iot: Taxonomy, challenges and future research direction
Sadhu et al. Internet of things: Security and solutions survey
Din et al. Trust management techniques for the Internet of Things: A survey
Turner et al. A promising integration of sdn and blockchain for iot networks: A survey
Khaliq et al. A secure and privacy preserved parking recommender system using elliptic curve cryptography and local differential privacy
Wang et al. STAMP: Enabling privacy-preserving location proofs for mobile users
Dwivedi et al. Smart contract and IPFS-based trustworthy secure data storage and device authentication scheme in fog computing environment
Zahra et al. A generic and lightweight security mechanism for detecting malicious behavior in the uncertain Internet of Things using fuzzy logic-and fog-based approach
Bandara et al. Skunk—A blockchain and zero trust security enabled federated learning platform for 5G/6G network slicing
Khan et al. Quantum anonymous private information retrieval for distributed networks
Sai et al. A survey on privacy issues in mobile social networks
Chang et al. Protecting mobile crowd sensing against sybil attacks using cloud based trust management system
Ghonge et al. Cyber security and digital forensics: challenges and future trends
de Oliveira et al. An access control for IoT based on network community perception and social trust against Sybil attacks
Gao et al. Privacy-preserving in edge computing
Park et al. PoAh-enabled federated learning architecture for DDoS attack detection in IoT networks
Qu et al. Personalized privacy protection solutions
Sandeepa et al. Federated Learning for 6G Networks: Navigating Privacy Benefits and Challenges
Hamza et al. A social qualitative trust framework for Fog computing
Raza et al. Blockchain-based reputation and trust management for smart grids, healthcare, and transportation: a review
Baskaran et al. A secured authentication and DSM‐KL ascertained performance optimization of a hybrid block chain‐enabled framework for a multiple WSN
Kelly A taxonomy for and analysis of anonymous communications networks
Zhou et al. Stor: Social network based anonymous communication in tor