Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Taxonomy for Privacy Policies of Social Networks Sites
(Articles)
Sergio Donizetti Zorzo
,
Rodrigo Pereira Botelho
,
Paulo Muniz de Ávila
Social Networking
Vol.2 No.4
,October 30, 2013
DOI:
10.4236/sn.2013.24015
5,316
Downloads
9,957
Views
Citations
Breach Notification in the General Data Protection Regulation
(Articles)
M’Bia Hortense De-Yolande
,
Théo Doh-Djanhoundji
,
Gabo Yves Constant
Voice of the Publisher
Vol.9 No.4
,December 26, 2023
DOI:
10.4236/vp.2023.94026
53
Downloads
240
Views
Citations
Toward Secure Vehicular Ad Hoc Networks an Overview and Comparative Study
(Articles)
Yousef Al-Raba’nah
,
Mohammed Al-Refai
Journal of Computer and Communications
Vol.4 No.16
,December 9, 2016
DOI:
10.4236/jcc.2016.416002
2,063
Downloads
4,142
Views
Citations
A Comparative Analysis of the Current Status and Trends of Domestic and International Privacy Protection Research—CiteSpace-Based Bibliometric Study (1976-2022)
(Articles)
Yushi Yin
,
Dongphil Chun
,
Zhiying Tang
,
Minghao Huang
Open Journal of Business and Management
Vol.10 No.6
,November 8, 2022
DOI:
10.4236/ojbm.2022.106150
180
Downloads
888
Views
Citations
A Privacy Enabled Fast Dynamic Authentication and Authorization for B3G/4G Mobility
(Articles)
Zhikui CHEN
,
Song YANG
Communications and Network
Vol.1 No.2
,December 1, 2009
DOI:
10.4236/cn.2009.12012
6,542
Downloads
10,363
Views
Citations
Secured Electronic Voting Protocol Using Biometric Authentication
(Articles)
Kalaichelvi Visvalingam
,
R. M. Chandrasekaran
Advances in Internet of Things
Vol.1 No.2
,July 26, 2011
DOI:
10.4236/ait.2011.12006
10,627
Downloads
25,705
Views
Citations
Secure Bluetooth for Trusted m-Commerce
(Articles)
Pasquale Stirparo
,
Jan Löschner
Int'l J. of Communications, Network and System Sciences
Vol.6 No.6
,June 18, 2013
DOI:
10.4236/ijcns.2013.66030
15,907
Downloads
44,332
Views
Citations
A Proposed Layered Architecture to Maintain Privacy Issues in Electronic Medical Records
(Articles)
Ameur Bensefia
,
Anis Zarrad
E-Health Telecommunication Systems and Networks
Vol.3 No.4
,November 7, 2014
DOI:
10.4236/etsn.2014.34006
3,832
Downloads
5,195
Views
Citations
Security & Privacy Implications in the Placement of Biometric-Based ID Card for Rwanda Universities
(Articles)
Eugen Harinda
,
Etienne Ntagwirumugara
Journal of Information Security
Vol.6 No.2
,March 31, 2015
DOI:
10.4236/jis.2015.62010
6,505
Downloads
8,754
Views
Citations
Risks behind Device Information Permissions in Android OS
(Articles)
Ali Alshehri
,
Anthony Hewins
,
Maria McCulley
,
Hani Alshahrani
,
Huirong Fu
,
Ye Zhu
Communications and Network
Vol.9 No.4
,November 10, 2017
DOI:
10.4236/cn.2017.94016
2,470
Downloads
11,783
Views
Citations
Biometrics as a Matrix: The Short Distance between Crime and Security Systems, Prompting an Artificial Intelligence to Invent Electronic Biometrics ID!
(Articles)
Ahmed Laarfi
International Journal of Intelligence Science
Vol.12 No.1
,January 11, 2022
DOI:
10.4236/ijis.2022.121001
187
Downloads
941
Views
Citations
Security Threads and IoT Security
(Articles)
Dona Alkunidry
,
Shahad Alhuwaysi
,
Rawan Alharbi
Journal of Computer and Communications
Vol.11 No.9
,September 28, 2023
DOI:
10.4236/jcc.2023.119005
115
Downloads
1,136
Views
Citations
The Failure and Response of Risk Prevention Regulations: Taking Privacy Computing as an Example
(Articles)
Xinhui Liu
Open Journal of Social Sciences
Vol.11 No.11
,November 30, 2023
DOI:
10.4236/jss.2023.1111035
30
Downloads
116
Views
Citations
Privacy Accountability Model and Policy for Security Organizations
(Articles)
Yoel Raban
iBusiness
Vol.4 No.2
,June 20, 2012
DOI:
10.4236/ib.2012.42020
3,632
Downloads
6,065
Views
Citations
A Comparative Study on Consumer Right to Privacy in E-Commerce
(Articles)
Meirong Guo
Modern Economy
Vol.3 No.4
,July 24, 2012
DOI:
10.4236/me.2012.34052
12,309
Downloads
20,309
Views
Citations
Protection of Individual Privacy under the Continental and Anglo-Saxon Systems: Legal and Criminal Aspects
(Articles)
Saleh Sharari
,
Raed S. A. Faqir
Beijing Law Review
Vol.5 No.3
,September 25, 2014
DOI:
10.4236/blr.2014.53018
3,116
Downloads
4,518
Views
Citations
A Semantically Sensitive Privacy Protection Method for Trajectory Publishing
(Articles)
Zhijian Shao
,
Bingwen Feng
,
Xingzheng Li
Journal of Computer and Communications
Vol.9 No.4
,April 16, 2021
DOI:
10.4236/jcc.2021.94003
325
Downloads
1,054
Views
Citations
Transparency in a Digitally Intertwined World: A Hybrid Approach to Consumers’ Protection
(Articles)
Lydia Montalbano
Open Journal of Social Sciences
Vol.9 No.8
,August 31, 2021
DOI:
10.4236/jss.2021.98031
255
Downloads
1,210
Views
Citations
Data Misuse, Data Theft and Data Protection in Nigeria: A Call for a More Robust and More Effective Legislation
(Articles)
Abiodun Odusote
Beijing Law Review
Vol.12 No.4
,December 29, 2021
DOI:
10.4236/blr.2021.124066
326
Downloads
3,501
Views
Citations
This article belongs to the Special Issue on
Legal Awareness and Legal Culture
A Verifiable Credentials System with Privacy-Preserving Based on Blockchain
(Articles)
Zhiji Li
Journal of Information Security
Vol.13 No.2
,February 28, 2022
DOI:
10.4236/jis.2022.132003
505
Downloads
3,062
Views
Citations
<
1
2
3
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top