Intelligent Information Management

Intelligent Information Management

ISSN Print: 2160-5912
ISSN Online: 2160-5920
www.scirp.org/journal/iim
E-mail: iim@scirp.org
"Experimentation with Personal Identifiable Information"
written by Sabah Al-Fedaghi, Abdul Aziz Rashid Al-Azmi,
published by Intelligent Information Management, Vol.4 No.4, 2012
has been cited by the following article(s):
  • Google Scholar
  • CrossRef
[1] Analysis of Air Pollution Level In Settlement Area Using Passive Sampler Method
… of Hydrological and …, 2022
[2] La definición de perfiles en el derecho tributário y la protección de los datos personales de los obligados tributários en el derecho portugués
Revista de la Facultad de Derecho, 2021
[3] La definição de perfis no direito tributário ea tutela dos dados pessoais dos obrigados tributários no direito português
Revista de la Facultad de Derecho, 2021
[4] Privacy, Self-Sovereign Identity Technology and the Willingness to Provide Personal Information
2021
[5] Design and Development of a Dynamic and Efficient PII Data Loss Prevention System
2021
[6] Was sind persönliche Daten wert? Entwicklung eines Artefakts zur Ermittlung der optimalen Methode zur Bewertung von persönlichen Daten/eingereicht von Thomas …
2020
[7] Software Architecture as a Thinging Machine: A Case Study of Monthly Salary System
2019
[8] Privacy Things: Systematic Approach to Privacy and Personal Identifiable Information
2018
[9] CAMPS: Efficient and privacy-preserving medical primary diagnosis over outsourced cloud
2018
[10] CINEMA: Efficient and privacy-preserving online medical primary diagnosis with skyline query
2018
[11] Medicare
2017
[12] The defining approaches and practical paradox of sensitive data: An investigation of data protection laws in 92 countries and regions and 200 data breaches in the …
2017
[13] The Defining Approaches and Practical Paradox of Sensitive Data: An Investigation of Data Protection Laws in 92 Countries and Regions and 200 Data Breaches in …
2017
[14] HEART DISEASE PREDICTION USING ANN ALGORITHM IN DATA MINING
International Journal of Computer Science & Mobile Computing, 2017
[15] The Defining Approaches and Practical Paradox of Sensitive Data: An Investigation of Data Protection Laws in 92 Countries and Regions and 200 Data Breaches in …
2017
[16] The defining approaches and practical paradox of sensitive data: An investigation of data protection laws in 92 countries and regions and 200 data …
2017
[17] A responsible de-identification of the Real Data Corpus: building a framework for PII management
2016
[18] Thing-oriented learning: Application to mathematical objects
2016
[19] Mobile Health Monitoring System using cloud computing
2016
[20] Public cloud user authentication and data confidentiality using image steganography with hash function
American Journal of Applied Mathematics, 2015
[21] CAM: Double Standard Security Mechanism In The Management Cloud Based Mobile Application
IJSEAT, 2015
[22] An Effective Mobile Online Health Monitoring System In Cloud
2015
[23] Attribute Based Encryption For Secure And E-Sharing Health Records In Cloud
International Journal of Mechanical Engineering and Computer Applications, 2015
[24] Evaluation of online resources on the implementation of the protection of personal information act in south africa
Iccws 2015-The Proceedings of the 10th International Conference on Cyber Warfare and Security: ICCWS2015, 2015
[25] Altruism as a Tool for optimization: Literature Review
International Journal of Engineering Trends and Technology (IJETT), 2015
[26] Design and Analysis of Aircraft Wing
International Journal & Magazine of Engineering, Technology, Management and Research, 2015
[27] Health Monitoring For Secrecy Conserving Using Cloud Computing
International Journal of Engineering Research and Applications, 2014
[28] Mobile Health Monitoring Technique using Cloud Computing
International Journal of Recent Technology and Engineering, 2014
[29] A Literature Survey on Facial Expression Recognition techniques using Appearance based feature
International Journal of Computer Trends and Technology (IJCTT), 2014
[30] AN EFFICIENT APPROACH FOR MOBILE HEALTH MONITORING
International Journal of Computer Science and Mobile Computing, 2014
[31] Haze-Assisted Confidentiality Conserving Mobile Health Monitoring
International Journal of Science Engineering and Advance Technology, 2014
[32] Discretion Preservative Itinerant Health Scrutinising By Haze Succour
International Journal of Science Engineering and Advance Technology, 2014
[33] Privacy and Efficiency On Health Care Data Using Private Proxy Reencryption Scheme
International Journal of Innovative Research in Computer and Communication Engineering, 2014
[34] Privacy Towards Cloud Based Mobile Health Monitoring Services
International Journal of Scientific Research in Computer Science (IJSRCS), 2014
[35] PPM: Privacy Preserving In Mobile Health Monitoring System
IJRIT International Journal of Research in Information Technology, 2014
[36] Secured Health Monitoring System in Mobile Cloud Computing
International Journal of Computer Trends and Technology (IJCTT), 2014
[37] An Automatic Personalized Monitoring Service To Provide Security And Privacy Using Cam
IJRCCT, 2014
[38] A Key Private Re-Encryption Scheme To Secure And Privacy-Preserving Using Cam
IJRCCT, 2014
[39] CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring
Information Forensics and Security, IEEE Transactions on 8.6, 2013
[40] The Design and Implementation of Intellectualized PSTN in China.
International Journal of Digital Content Technology & its Applications, 2013
[41] A Modified Anonymisation Algorithm Towards Reducing Information Loss.
2013
[42] A modified anonymisation algorithm towards reducing information loss
2013
Free SCIRP Newsletters
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top