Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Taxonomy for Privacy Policies of Social Networks Sites
(Articles)
Sergio Donizetti Zorzo
,
Rodrigo Pereira Botelho
,
Paulo Muniz de Ávila
Social Networking
Vol.2 No.4
,October 30, 2013
DOI:
10.4236/sn.2013.24015
5,461
Downloads
10,107
Views
Citations
Breach Notification in the General Data Protection Regulation
(Articles)
M’Bia Hortense De-Yolande
,
Théo Doh-Djanhoundji
,
Gabo Yves Constant
Voice of the Publisher
Vol.9 No.4
,December 26, 2023
DOI:
10.4236/vp.2023.94026
201
Downloads
1,129
Views
Citations
Toward Secure Vehicular Ad Hoc Networks an Overview and Comparative Study
(Articles)
Yousef Al-Raba’nah
,
Mohammed Al-Refai
Journal of Computer and Communications
Vol.4 No.16
,December 9, 2016
DOI:
10.4236/jcc.2016.416002
2,146
Downloads
4,318
Views
Citations
The Evolution of Cloud Security Frameworks: Identity Management and Zero Trust Implementation in Distributed Systems
(Articles)
Enkai Ji
,
Jianian Jin
,
Qun Zhang
Journal of Computer and Communications
Vol.13 No.7
,July 2, 2025
DOI:
10.4236/jcc.2025.137001
18
Downloads
114
Views
Citations
A Comparative Analysis of the Current Status and Trends of Domestic and International Privacy Protection Research—CiteSpace-Based Bibliometric Study (1976-2022)
(Articles)
Yushi Yin
,
Dongphil Chun
,
Zhiying Tang
,
Minghao Huang
Open Journal of Business and Management
Vol.10 No.6
,November 8, 2022
DOI:
10.4236/ojbm.2022.106150
268
Downloads
1,389
Views
Citations
A Privacy Enabled Fast Dynamic Authentication and Authorization for B3G/4G Mobility
(Articles)
Zhikui CHEN
,
Song YANG
Communications and Network
Vol.1 No.2
,December 1, 2009
DOI:
10.4236/cn.2009.12012
6,655
Downloads
10,509
Views
Citations
Secured Electronic Voting Protocol Using Biometric Authentication
(Articles)
Kalaichelvi Visvalingam
,
R. M. Chandrasekaran
Advances in Internet of Things
Vol.1 No.2
,July 26, 2011
DOI:
10.4236/ait.2011.12006
10,925
Downloads
24,848
Views
Citations
Secure Bluetooth for Trusted m-Commerce
(Articles)
Pasquale Stirparo
,
Jan Löschner
Int'l J. of Communications, Network and System Sciences
Vol.6 No.6
,June 18, 2013
DOI:
10.4236/ijcns.2013.66030
16,126
Downloads
44,222
Views
Citations
A Proposed Layered Architecture to Maintain Privacy Issues in Electronic Medical Records
(Articles)
Ameur Bensefia
,
Anis Zarrad
E-Health Telecommunication Systems and Networks
Vol.3 No.4
,November 7, 2014
DOI:
10.4236/etsn.2014.34006
3,956
Downloads
5,472
Views
Citations
Security & Privacy Implications in the Placement of Biometric-Based ID Card for Rwanda Universities
(Articles)
Eugen Harinda
,
Etienne Ntagwirumugara
Journal of Information Security
Vol.6 No.2
,March 31, 2015
DOI:
10.4236/jis.2015.62010
6,665
Downloads
8,846
Views
Citations
Risks behind Device Information Permissions in Android OS
(Articles)
Ali Alshehri
,
Anthony Hewins
,
Maria McCulley
,
Hani Alshahrani
,
Huirong Fu
,
Ye Zhu
Communications and Network
Vol.9 No.4
,November 10, 2017
DOI:
10.4236/cn.2017.94016
2,568
Downloads
14,720
Views
Citations
Biometrics as a Matrix: The Short Distance between Crime and Security Systems, Prompting an Artificial Intelligence to Invent Electronic Biometrics ID!
(Articles)
Ahmed Laarfi
International Journal of Intelligence Science
Vol.12 No.1
,January 11, 2022
DOI:
10.4236/ijis.2022.121001
286
Downloads
1,199
Views
Citations
Security Threads and IoT Security
(Articles)
Dona Alkunidry
,
Shahad Alhuwaysi
,
Rawan Alharbi
Journal of Computer and Communications
Vol.11 No.9
,September 28, 2023
DOI:
10.4236/jcc.2023.119005
294
Downloads
2,009
Views
Citations
The Failure and Response of Risk Prevention Regulations: Taking Privacy Computing as an Example
(Articles)
Xinhui Liu
Open Journal of Social Sciences
Vol.11 No.11
,November 30, 2023
DOI:
10.4236/jss.2023.1111035
91
Downloads
307
Views
Citations
Ensuring Security and Privacy in the Internet of Things: Challenges and Solutions
(Articles)
Nur Mohammad
,
Rabeya Khatoon
,
Sadia Islam Nilima
,
Jahanara Akter
,
Md Kamruzzaman
,
Hasan Mahmud Sozib
Journal of Computer and Communications
Vol.12 No.8
,August 29, 2024
DOI:
10.4236/jcc.2024.128016
184
Downloads
1,377
Views
Citations
Consumer Protection in the Era of Digital Payments: Legal Challenges and Solutions
(Articles)
Nima Ballaji
Beijing Law Review
Vol.15 No.3
,September 20, 2024
DOI:
10.4236/blr.2024.153076
252
Downloads
2,329
Views
Citations
Privacy Accountability Model and Policy for Security Organizations
(Articles)
Yoel Raban
iBusiness
Vol.4 No.2
,June 20, 2012
DOI:
10.4236/ib.2012.42020
3,793
Downloads
6,356
Views
Citations
Privacy-Preserving LLM Integration with Scientific NoSQL Repositories: A Differential Privacy Approach
(Articles)
Tanmoy Biswas
World Journal of Engineering and Technology
Vol.13 No.2
,May 27, 2025
DOI:
10.4236/wjet.2025.132021
30
Downloads
157
Views
Citations
A Comparative Study on Consumer Right to Privacy in E-Commerce
(Articles)
Meirong Guo
Modern Economy
Vol.3 No.4
,July 24, 2012
DOI:
10.4236/me.2012.34052
12,627
Downloads
19,438
Views
Citations
Protection of Individual Privacy under the Continental and Anglo-Saxon Systems: Legal and Criminal Aspects
(Articles)
Saleh Sharari
,
Raed S. A. Faqir
Beijing Law Review
Vol.5 No.3
,September 25, 2014
DOI:
10.4236/blr.2014.53018
3,248
Downloads
4,836
Views
Citations
<
1
2
3
...
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top