Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Privacy Preserving Two-Party Hierarchical Clustering Over Vertically Partitioned Dataset
(Articles)
Animesh Tripathy
,
Ipsa De
Journal of Software Engineering and Applications
Vol.6 No.5B
,October 12, 2013
DOI:
10.4236/jsea.2013.65B006
3,617
Downloads
5,288
Views
Citations
Attacks on Anonymization-Based Privacy-Preserving: A Survey for Data Mining and Data Publishing
(Articles)
Abou-el-ela Abdou Hussien
,
Nermin Hamza
,
Hesham A. Hefny
Journal of Information Security
Vol.4 No.2
,April 23, 2013
DOI:
10.4236/jis.2013.42012
8,905
Downloads
15,370
Views
Citations
Research on Personal Privacy Protection of China in the Era of Big Data
(Articles)
Hui Zhao
,
Haoxin Dong
Open Journal of Social Sciences
Vol.5 No.6
,June 19, 2017
DOI:
10.4236/jss.2017.56012
3,404
Downloads
7,461
Views
Citations
Empirical Analysis of Data Privacy Concerns in DEI
(Articles)
Parisasadat Shojaei
,
Rezza Moieni
Open Journal of Social Sciences
Vol.13 No.6
,June 13, 2025
DOI:
10.4236/jss.2025.136006
31
Downloads
185
Views
Citations
Utility-Based Anonymization Using Generalization Boundaries to Protect Sensitive Attributes
(Articles)
Abou-el-ela Abdou Hussien
,
Nagy Ramadan Darwish
,
Hesham A. Hefny
Journal of Information Security
Vol.6 No.3
,June 15, 2015
DOI:
10.4236/jis.2015.63019
4,846
Downloads
5,812
Views
Citations
Cloud-Based Access Control to Preserve Privacy in Academic Web Application
(Articles)
Aljwhrh Almtrf
,
Mohamed Zohdy
Journal of Computer and Communications
Vol.7 No.12
,December 16, 2019
DOI:
10.4236/jcc.2019.712005
726
Downloads
1,790
Views
Citations
Data Misuse, Data Theft and Data Protection in Nigeria: A Call for a More Robust and More Effective Legislation
(Articles)
Abiodun Odusote
Beijing Law Review
Vol.12 No.4
,December 29, 2021
DOI:
10.4236/blr.2021.124066
464
Downloads
4,314
Views
Citations
This article belongs to the Special Issue on
Legal Awareness and Legal Culture
A Dynamic Social Network Data Publishing Algorithm Based on Differential Privacy
(Articles)
Zhenpeng Liu
,
Yawei Dong
,
Xuan Zhao
,
Bin Zhang
Journal of Information Security
Vol.8 No.4
,October 20, 2017
DOI:
10.4236/jis.2017.84021
1,244
Downloads
2,461
Views
Citations
A Smart Robot Training Data Acquisition and Learning Process Recording System Based on Blockchain
(Articles)
Kun Wang
,
Chen Yang
,
Tao Wang
Open Access Library Journal
Vol.7 No.9
,September 1, 2020
DOI:
10.4236/oalib.1106711
303
Downloads
927
Views
Citations
A Method to Improve the Accuracy of Personal Information Detection
(Articles)
Chih-Chieh Chiu
,
Chu-Sing Yang
,
Ce-Kuen Shieh
Journal of Computer and Communications
Vol.11 No.6
,June 30, 2023
DOI:
10.4236/jcc.2023.116010
184
Downloads
1,023
Views
Citations
The Failure and Response of Risk Prevention Regulations: Taking Privacy Computing as an Example
(Articles)
Xinhui Liu
Open Journal of Social Sciences
Vol.11 No.11
,November 30, 2023
DOI:
10.4236/jss.2023.1111035
87
Downloads
293
Views
Citations
Breach Notification in the General Data Protection Regulation
(Articles)
M’Bia Hortense De-Yolande
,
Théo Doh-Djanhoundji
,
Gabo Yves Constant
Voice of the Publisher
Vol.9 No.4
,December 26, 2023
DOI:
10.4236/vp.2023.94026
198
Downloads
1,108
Views
Citations
Statistical Analysis of Abilities to Give Consent to Health Data Processing
(Articles)
Antonella Massari
,
Biagio Solarino
,
Paola Perchinunno
,
Angela Maria D’Uggento
,
Marcello Benevento
,
Viviana D’Addosio
,
Vittoria Claudia De Nicolò
,
Samuela L’Abbate
Applied Mathematics
Vol.15 No.8
,August 19, 2024
DOI:
10.4236/am.2024.158032
88
Downloads
351
Views
Citations
“stppSim”: A Novel Analytical Tool for Creating Synthetic Spatio-Temporal Point Data
(Articles)
Monsuru Adepeju
Open Journal of Modelling and Simulation
Vol.11 No.4
,October 12, 2023
DOI:
10.4236/ojmsi.2023.114007
138
Downloads
562
Views
Citations
Privacy Accountability Model and Policy for Security Organizations
(Articles)
Yoel Raban
iBusiness
Vol.4 No.2
,June 20, 2012
DOI:
10.4236/ib.2012.42020
3,790
Downloads
6,344
Views
Citations
Privacy-Preserving LLM Integration with Scientific NoSQL Repositories: A Differential Privacy Approach
(Articles)
Tanmoy Biswas
World Journal of Engineering and Technology
Vol.13 No.2
,May 27, 2025
DOI:
10.4236/wjet.2025.132021
28
Downloads
140
Views
Citations
The Impact of Online Networks and Big Data in Life Sciences
(Articles)
Ruchita Gujarathi
,
Fabricio F. Costa
Social Networking
Vol.3 No.1
,January 23, 2014
DOI:
10.4236/sn.2014.31007
6,526
Downloads
17,481
Views
Citations
A Semantically Sensitive Privacy Protection Method for Trajectory Publishing
(Articles)
Zhijian Shao
,
Bingwen Feng
,
Xingzheng Li
Journal of Computer and Communications
Vol.9 No.4
,April 16, 2021
DOI:
10.4236/jcc.2021.94003
424
Downloads
1,298
Views
Citations
Transparency in a Digitally Intertwined World: A Hybrid Approach to Consumers’ Protection
(Articles)
Lydia Montalbano
Open Journal of Social Sciences
Vol.9 No.8
,August 31, 2021
DOI:
10.4236/jss.2021.98031
455
Downloads
1,849
Views
Citations
Enhancing Cybersecurity through AI and ML: Strategies, Challenges, and Future Directions
(Articles)
Maryam Roshanaei
,
Mahir R. Khan
,
Natalie N. Sylvester
Journal of Information Security
Vol.15 No.3
,July 5, 2024
DOI:
10.4236/jis.2024.153019
1,232
Downloads
8,787
Views
Citations
<
1
2
3
...
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top