12 results for privacy.

Parameters for your search query:
Keyword     privacy

Open AccessDesign
Export: RIS | BibTeX | EndNote
Efficient Data Privacy and Security in Autonomous Cars
Journal of Computer Sciences and Applications. 2019, 7(1), 31-36. DOI: 10.12691/jcsa-7-1-5
Pub. Date: May 10, 2019Views: 2972Downloads: 2252
Open AccessArticle
Export: RIS | BibTeX | EndNote
Big Data and Data-Driven Healthcare Systems
Journal of Business and Management Sciences. 2018, 6(3), 104-111. DOI: 10.12691/jbms-6-3-7
Pub. Date: June 29, 2018Views: 24254Downloads: 22896
Figure of 7
Open AccessArticle
Export: RIS | BibTeX | EndNote
Big Data Analytics in Biometrics and Healthcare
Journal of Computer Sciences and Applications. 2018, 6(1), 48-55. DOI: 10.12691/jcsa-6-1-7
Pub. Date: June 04, 2018Views: 22519Downloads: 20595
Open AccessArticle
Export: RIS | BibTeX | EndNote
ASP: Advanced Security Protocol for Security and Privacy in Cloud Computing
American Journal of Information Systems. 2016, 4(2), 17-31. DOI: 10.12691/ajis-4-2-1
Pub. Date: March 16, 2016Views: 17904Downloads: 15616Citations: 1
Figure of 9
Open AccessArticle
Export: RIS | BibTeX | EndNote
Enhanced Anonymous Tag Based Credentials
Information Security and Computer Fraud. 2014, 2(1), 10-20. DOI: 10.12691/iscf-2-1-3
Pub. Date: March 24, 2014Views: 14276Downloads: 9228
Open AccessReview Article
Export: RIS | BibTeX | EndNote
Big Data Analytics in Identification, Treatment, and Cost-Reduction of Hypertension
American Journal of Hypertension Research. 2017, 4(1), 1-8. DOI: 10.12691/ajhr-4-1-1
Pub. Date: April 15, 2017Views: 21296Downloads: 18720
Open AccessArticle
Export: RIS | BibTeX | EndNote
Perceived Risk and Behavioral Determinants of Using Internet Banking in Egypt
Journal of Behavioural Economics, Finance, Entrepreneurship, Accounting and Transport. 2016, 4(3), 40-48. DOI: 10.12691/jbe-4-3-1
Pub. Date: September 08, 2016Views: 9255Downloads: 6716
Open AccessArticle
Export: RIS | BibTeX | EndNote
Linear Mix-net and a Scheme for Collecting Data from Anonymous Data Holders
Information Security and Computer Fraud. 2014, 2(3), 39-47. DOI: 10.12691/iscf-2-3-2
Pub. Date: November 11, 2014Views: 10087Downloads: 6439
Open AccessArticle
Export: RIS | BibTeX | EndNote
The DISTANCE Model for Collaborative Research: Distributing Analytic Effort Using Scrambled Data Sets
Information Security and Computer Fraud. 2014, 2(3), 33-38. DOI: 10.12691/iscf-2-3-1
Pub. Date: October 27, 2014Views: 11998Downloads: 8138
Open AccessArticle
Export: RIS | BibTeX | EndNote
Design and Development of E-Health System
Journal of Computer Sciences and Applications. 2018, 6(1), 1-16. DOI: 10.12691/jcsa-6-1-1
Pub. Date: April 12, 2018Views: 7317Downloads: 6315
Results: sort by Relevance

Filter by

Date

Published between:

and

Subjects



Journals







Article Types