Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journals
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Publication Date:
📅
--📅
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Breach Notification in the General Data Protection Regulation
(Articles)
M’Bia Hortense De-Yolande
,
Théo Doh-Djanhoundji
,
Gabo Yves Constant
Voice of the Publisher
Vol.9 No.4
, December 26, 2023
DOI:
10.4236/vp.2023.94026
279
Downloads
1,627
Views
Citations
The Failure and Response of Risk Prevention Regulations: Taking Privacy Computing as an Example
(Articles)
Xinhui Liu
Open Journal of Social Sciences
Vol.11 No.11
, November 30, 2023
DOI:
10.4236/jss.2023.1111035
134
Downloads
442
Views
Citations
Enhancing Cybersecurity through AI and ML: Strategies, Challenges, and Future Directions
(Articles)
Maryam Roshanaei
,
Mahir R. Khan
,
Natalie N. Sylvester
Journal of Information Security
Vol.15 No.3
, July 5, 2024
DOI:
10.4236/jis.2024.153019
1,443
Downloads
10,709
Views
Citations
Privacy-Preserving LLM Integration with Scientific NoSQL Repositories: A Differential Privacy Approach
(Articles)
Tanmoy Biswas
World Journal of Engineering and Technology
Vol.13 No.2
, May 27, 2025
DOI:
10.4236/wjet.2025.132021
73
Downloads
482
Views
Citations
Exploring the Characteristics of Data Breaches: A Descriptive Analytic Study
(Articles)
Dominik Molitor
,
Aditya Saharia
,
Viju Raghupathi
,
Wullianallur Raghupathi
Journal of Information Security
Vol.15 No.2
, April 2, 2024
DOI:
10.4236/jis.2024.152011
502
Downloads
3,582
Views
Citations
Fifty-Six Big Data V’s Characteristics and Proposed Strategies to Overcome Security and Privacy Challenges (BD2)
(Articles)
Abou_el_ela Abdou Hussein
Journal of Information Security
Vol.11 No.4
, October 30, 2020
DOI:
10.4236/jis.2020.114019
1,518
Downloads
7,450
Views
Citations
Enhancing Mobile Cloud Computing Security Using Steganography
(Articles)
Hassan Reza
,
Madhuri Sonawane
Journal of Information Security
Vol.7 No.4
, July 19, 2016
DOI:
10.4236/jis.2016.74020
3,788
Downloads
7,049
Views
Citations
The Evolution of Cloud Security Frameworks: Identity Management and Zero Trust Implementation in Distributed Systems
(Articles)
Enkai Ji
,
Jianian Jin
,
Qun Zhang
Journal of Computer and Communications
Vol.13 No.7
, July 2, 2025
DOI:
10.4236/jcc.2025.137001
93
Downloads
684
Views
Citations
Taxonomy for Privacy Policies of Social Networks Sites
(Articles)
Sergio Donizetti Zorzo
,
Rodrigo Pereira Botelho
,
Paulo Muniz de Ávila
Social Networking
Vol.2 No.4
, October 30, 2013
DOI:
10.4236/sn.2013.24015
5,550
Downloads
10,357
Views
Citations
Toward Secure Vehicular Ad Hoc Networks an Overview and Comparative Study
(Articles)
Yousef Al-Raba’nah
,
Mohammed Al-Refai
Journal of Computer and Communications
Vol.4 No.16
, December 9, 2016
DOI:
10.4236/jcc.2016.416002
2,204
Downloads
4,577
Views
Citations
Security Model for Preserving Privacy over Encrypted Cloud Computing
(Articles)
Jassim R. Mlgheit
,
Essam H. Houssein
,
Hala H. Zayed
Journal of Computer and Communications
Vol.5 No.6
, April 30, 2017
DOI:
10.4236/jcc.2017.56009
2,061
Downloads
4,431
Views
Citations
Consumer Protection in the Era of Digital Payments: Legal Challenges and Solutions
(Articles)
Nima Ballaji
Beijing Law Review
Vol.15 No.3
, September 20, 2024
DOI:
10.4236/blr.2024.153076
369
Downloads
3,703
Views
Citations
Blockchain Brains: Pioneering AI, ML, and DLT Solutions for Healthcare and Psychology
(Articles)
Rocco de Filippis
,
Abdullah Al Foysal
Open Access Library Journal
Vol.11 No.12
, December 6, 2024
DOI:
10.4236/oalib.1112543
105
Downloads
929
Views
Citations
A Literature Review: Potential Effects That Health Apps on Mobile Devices May Have on Patient Privacy and Confidentiality
(Articles)
Anna Sheri George
,
Jomin George
,
Judy Jenkins
E-Health Telecommunication Systems and Networks
Vol.13 No.3
, August 9, 2024
DOI:
10.4236/etsn.2024.133003
227
Downloads
2,151
Views
Citations
Privacy Preserving Two-Party Hierarchical Clustering Over Vertically Partitioned Dataset
(Articles)
Animesh Tripathy
,
Ipsa De
Journal of Software Engineering and Applications
Vol.6 No.5B
, October 12, 2013
DOI:
10.4236/jsea.2013.65B006
3,703
Downloads
5,537
Views
Citations
Attacks on Anonymization-Based Privacy-Preserving: A Survey for Data Mining and Data Publishing
(Articles)
Abou-el-ela Abdou Hussien
,
Nermin Hamza
,
Hesham A. Hefny
Journal of Information Security
Vol.4 No.2
, April 23, 2013
DOI:
10.4236/jis.2013.42012
9,067
Downloads
15,878
Views
Citations
Research on Personal Privacy Protection of China in the Era of Big Data
(Articles)
Hui Zhao
,
Haoxin Dong
Open Journal of Social Sciences
Vol.5 No.6
, June 19, 2017
DOI:
10.4236/jss.2017.56012
3,491
Downloads
7,839
Views
Citations
Empirical Analysis of Data Privacy Concerns in DEI
(Articles)
Parisasadat Shojaei
,
Rezza Moieni
Open Journal of Social Sciences
Vol.13 No.6
, June 13, 2025
DOI:
10.4236/jss.2025.136006
200
Downloads
932
Views
Citations
A Privacy Enabled Fast Dynamic Authentication and Authorization for B3G/4G Mobility
(Articles)
Zhikui CHEN
,
Song YANG
Communications and Network
Vol.1 No.2
, December 1, 2009
DOI:
10.4236/cn.2009.12012
6,742
Downloads
10,738
Views
Citations
Secured Electronic Voting Protocol Using Biometric Authentication
(Articles)
Kalaichelvi Visvalingam
,
R. M. Chandrasekaran
Advances in Internet of Things
Vol.1 No.2
, July 26, 2011
DOI:
10.4236/ait.2011.12006
11,024
Downloads
25,524
Views
Citations
First
<
1
2
3
...
>
Last
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2026 Scientific Research Publishing Inc. All Rights Reserved.
Top