[1]
|
SARA: A Collection of Sensitivity-Aware Relevance Assessments
|
|
arXiv preprint arXiv:2401.05144,
2024 |
|
|
[2]
|
Intelligent Broker Design for IoT Using a Multi-Cloud Environment
|
|
… of Deep Learning and Internet of …,
2023 |
|
|
[3]
|
I Never Trust My University for This! Investigating Student PII Leakage at Vietnamese Universities
|
|
IEICE TRANSACTIONS on …,
2023 |
|
|
[4]
|
A Survey Study of Social Media User Awareness Towards Personal Identifiable Information's Data Security in Indonesian Millennial Generation
|
|
2023 3rd International …,
2023 |
|
|
[5]
|
Analysis of Air Pollution Level In Settlement Area Using Passive Sampler Method
|
|
… of Hydrological and …,
2022 |
|
|
[6]
|
Uma Administração Tributária artificialmente “inteligente”? Entre a integração da inteligência artificial no procedimento tributário, o direito à …
|
|
2022 |
|
|
[7]
|
La definición de perfiles en el derecho tributário y la protección de los datos personales de los obligados tributários en el derecho portugués
|
|
Revista de la Facultad de Derecho,
2021 |
|
|
[8]
|
La definição de perfis no direito tributário ea tutela dos dados pessoais dos obrigados tributários no direito português
|
|
Revista de la Facultad de Derecho,
2021 |
|
|
[9]
|
Privacy, Self-Sovereign Identity Technology and the Willingness to Provide Personal Information
|
|
2021 |
|
|
[10]
|
The Profiling in Tax Law and the Protection of the Personal Data of Taxpayers in Portuguese Law
|
|
Revista de la Facultad de Derecho,
2021 |
|
|
[11]
|
Design and Development of a Dynamic and Efficient PII Data Loss Prevention System
|
|
2021 |
|
|
[12]
|
Was sind persönliche Daten wert? Entwicklung eines Artefakts zur Ermittlung der optimalen Methode zur Bewertung von persönlichen Daten/eingereicht von Thomas …
|
|
2020 |
|
|
[13]
|
Software Architecture as a Thinging Machine: A Case Study of Monthly Salary System
|
|
2019 |
|
|
[14]
|
Privacy Things: Systematic Approach to Privacy and Personal Identifiable Information
|
|
2018 |
|
|
[15]
|
CAMPS: Efficient and privacy-preserving medical primary diagnosis over outsourced cloud
|
|
2018 |
|
|
[16]
|
CINEMA: Efficient and privacy-preserving online medical primary diagnosis with skyline query
|
|
2018 |
|
|
[17]
|
Privacy Things
|
|
Fedaghi - International Journal of Computer Science and …,
2018 |
|
|
[18]
|
Medicare
|
|
2017 |
|
|
[19]
|
The defining approaches and practical paradox of sensitive data: An investigation of data protection laws in 92 countries and regions and 200 data breaches in the …
|
|
2017 |
|
|
[20]
|
The Defining Approaches and Practical Paradox of Sensitive Data: An Investigation of Data Protection Laws in 92 Countries and Regions and 200 Data Breaches in …
|
|
2017 |
|
|
[21]
|
HEART DISEASE PREDICTION USING ANN ALGORITHM IN DATA MINING
|
|
International Journal of Computer Science & Mobile Computing,
2017 |
|
|
[22]
|
The Defining Approaches and Practical Paradox of Sensitive Data: An Investigation of Data Protection Laws in 92 Countries and Regions and 200 Data Breaches in …
|
|
2017 |
|
|
[23]
|
The defining approaches and practical paradox of sensitive data: An investigation of data protection laws in 92 countries and regions and 200 data …
|
|
2017 |
|
|
[24]
|
A responsible de-identification of the Real Data Corpus: building a framework for PII management
|
|
2016 |
|
|
[25]
|
Thing-oriented learning: Application to mathematical objects
|
|
2016 |
|
|
[26]
|
Mobile Health Monitoring System using cloud computing
|
|
2016 |
|
|
[27]
|
Public cloud user authentication and data confidentiality using image steganography with hash function
|
|
American Journal of Applied Mathematics,
2015 |
|
|
[28]
|
CAM: Double Standard Security Mechanism In The Management Cloud Based Mobile Application
|
|
IJSEAT,
2015 |
|
|
[29]
|
An Effective Mobile Online Health Monitoring System In Cloud
|
|
2015 |
|
|
[30]
|
Attribute Based Encryption For Secure And E-Sharing Health Records In Cloud
|
|
International Journal of Mechanical Engineering and Computer Applications,
2015 |
|
|
[31]
|
Evaluation of online resources on the implementation of the protection of personal information act in south africa
|
|
Iccws 2015-The Proceedings of the 10th International Conference on Cyber Warfare and Security: ICCWS2015,
2015 |
|
|
[32]
|
Altruism as a Tool for optimization: Literature Review
|
|
International Journal of Engineering Trends and Technology (IJETT),
2015 |
|
|
[33]
|
Design and Analysis of Aircraft Wing
|
|
International Journal & Magazine of Engineering, Technology, Management and Research,
2015 |
|
|
[34]
|
Health Monitoring For Secrecy Conserving Using Cloud Computing
|
|
International Journal of Engineering Research and Applications,
2014 |
|
|
[35]
|
Mobile Health Monitoring Technique using Cloud Computing
|
|
International Journal of Recent Technology and Engineering,
2014 |
|
|
[36]
|
A Literature Survey on Facial Expression Recognition techniques using Appearance based feature
|
|
International Journal of Computer Trends and Technology (IJCTT),
2014 |
|
|
[37]
|
AN EFFICIENT APPROACH FOR MOBILE HEALTH MONITORING
|
|
International Journal of Computer Science and Mobile Computing,
2014 |
|
|
[38]
|
Haze-Assisted Confidentiality Conserving Mobile Health Monitoring
|
|
International Journal of Science Engineering and Advance Technology,
2014 |
|
|
[39]
|
Discretion Preservative Itinerant Health Scrutinising By Haze Succour
|
|
International Journal of Science Engineering and Advance Technology,
2014 |
|
|
[40]
|
Privacy and Efficiency On Health Care Data Using Private Proxy Reencryption Scheme
|
|
International Journal of Innovative Research in Computer and Communication Engineering,
2014 |
|
|
[41]
|
Privacy Towards Cloud Based Mobile Health Monitoring Services
|
|
International Journal of Scientific Research in Computer Science (IJSRCS),
2014 |
|
|
[42]
|
PPM: Privacy Preserving In Mobile Health Monitoring System
|
|
IJRIT International Journal of Research in Information Technology,
2014 |
|
|
[43]
|
Secured Health Monitoring System in Mobile Cloud Computing
|
|
International Journal of Computer Trends and Technology (IJCTT),
2014 |
|
|
[44]
|
An Automatic Personalized Monitoring Service To Provide Security And Privacy Using Cam
|
|
IJRCCT,
2014 |
|
|
[45]
|
A Key Private Re-Encryption Scheme To Secure And Privacy-Preserving Using Cam
|
|
IJRCCT,
2014 |
|
|
[46]
|
CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring
|
|
Information Forensics and Security, IEEE Transactions on 8.6,
2013 |
|
|
[47]
|
The Design and Implementation of Intellectualized PSTN in China.
|
|
International Journal of Digital Content Technology & its Applications,
2013 |
|
|
[48]
|
A Modified Anonymisation Algorithm Towards Reducing Information Loss.
|
|
2013 |
|
|
[49]
|
A modified anonymisation algorithm towards reducing information loss
|
|
2013 |
|
|