12 results for privacy.

Parameters for your search query:
Keyword     privacy

Open AccessDesign
Export: RIS | BibTeX | EndNote
Efficient Data Privacy and Security in Autonomous Cars
Journal of Computer Sciences and Applications. 2019, 7(1), 31-36. DOI: 10.12691/jcsa-7-1-5
Pub. Date: May 10, 2019Views: 12209Downloads: 11062
Open AccessArticle
Export: RIS | BibTeX | EndNote
Big Data and Data-Driven Healthcare Systems
Journal of Business and Management Sciences. 2018, 6(3), 104-111. DOI: 10.12691/jbms-6-3-7
Pub. Date: June 29, 2018Views: 38785Downloads: 37798
Figure of 7
Open AccessArticle
Export: RIS | BibTeX | EndNote
Big Data Analytics in Biometrics and Healthcare
Journal of Computer Sciences and Applications. 2018, 6(1), 48-55. DOI: 10.12691/jcsa-6-1-7
Pub. Date: June 04, 2018Views: 33448Downloads: 31607
Open AccessArticle
Export: RIS | BibTeX | EndNote
ASP: Advanced Security Protocol for Security and Privacy in Cloud Computing
American Journal of Information Systems. 2016, 4(2), 17-31. DOI: 10.12691/ajis-4-2-1
Pub. Date: March 16, 2016Views: 34956Downloads: 33447Citations: 1
Figure of 9
Open AccessArticle
Export: RIS | BibTeX | EndNote
Enhanced Anonymous Tag Based Credentials
Information Security and Computer Fraud. 2014, 2(1), 10-20. DOI: 10.12691/iscf-2-1-3
Pub. Date: March 24, 2014Views: 22563Downloads: 17823
Open AccessReview Article
Export: RIS | BibTeX | EndNote
Big Data Analytics in Identification, Treatment, and Cost-Reduction of Hypertension
American Journal of Hypertension Research. 2017, 4(1), 1-8. DOI: 10.12691/ajhr-4-1-1
Pub. Date: April 15, 2017Views: 29673Downloads: 27832
Open AccessArticle
Export: RIS | BibTeX | EndNote
Perceived Risk and Behavioral Determinants of Using Internet Banking in Egypt
Journal of Behavioural Economics, Finance, Entrepreneurship, Accounting and Transport. 2016, 4(3), 40-48. DOI: 10.12691/jbe-4-3-1
Pub. Date: September 08, 2016Views: 19261Downloads: 16270
Open AccessArticle
Export: RIS | BibTeX | EndNote
Linear Mix-net and a Scheme for Collecting Data from Anonymous Data Holders
Information Security and Computer Fraud. 2014, 2(3), 39-47. DOI: 10.12691/iscf-2-3-2
Pub. Date: November 11, 2014Views: 16807Downloads: 13443
Open AccessArticle
Export: RIS | BibTeX | EndNote
The DISTANCE Model for Collaborative Research: Distributing Analytic Effort Using Scrambled Data Sets
Information Security and Computer Fraud. 2014, 2(3), 33-38. DOI: 10.12691/iscf-2-3-1
Pub. Date: October 27, 2014Views: 19555Downloads: 16503
Open AccessArticle
Export: RIS | BibTeX | EndNote
Design and Development of E-Health System
Journal of Computer Sciences and Applications. 2018, 6(1), 1-16. DOI: 10.12691/jcsa-6-1-1
Pub. Date: April 12, 2018Views: 25452Downloads: 24331
Results: sort by Relevance

Filter by

Date

Published between:

and

Subjects



Journals







Article Types