Keywords: حفظ حریم خصوصی; Privacy preserving; mobile social network; location-based service; location privacy; anonymous region repartition;
مقالات ISI حفظ حریم خصوصی (ترجمه نشده)
مقالات زیر هنوز به فارسی ترجمه نشده اند.
در صورتی که به ترجمه آماده هر یک از مقالات زیر نیاز داشته باشید، می توانید سفارش دهید تا مترجمان با تجربه این مجموعه در اسرع وقت آن را برای شما ترجمه نمایند.
در صورتی که به ترجمه آماده هر یک از مقالات زیر نیاز داشته باشید، می توانید سفارش دهید تا مترجمان با تجربه این مجموعه در اسرع وقت آن را برای شما ترجمه نمایند.
Keywords: حفظ حریم خصوصی; Privacy preserving; Data sharing; Self-Organizing map;
Keywords: حفظ حریم خصوصی; Cloud computing; Privacy preserving; Proxy re-encryption; Broadcast re-encryption; Public key encryption;
Keywords: حفظ حریم خصوصی; Smart grid; Multidimensional aggregation; Privacy preserving; Access control;
Keywords: حفظ حریم خصوصی; Threat intelligence; Privacy preserving; Private information retrieval; Intrusion detection;
Keywords: حفظ حریم خصوصی; Sparse representation classification; Mobile computing; Privacy preserving;
Keywords: حفظ حریم خصوصی; Collaborate network; Privacy preserving; Intrusion detection; Cloud environment; Fog computing;
Keywords: حفظ حریم خصوصی; Privacy preserving; Continual data release; Differential privacy;
Keywords: حفظ حریم خصوصی; Privacy preserving; Machine learning; Cloud service;
Keywords: حفظ حریم خصوصی; Recommender system; Collaborative filtering; Privacy preserving; Healthcare; Homomorphic encryption;
Keywords: حفظ حریم خصوصی; Cloud computing; Privacy preserving; Data integrity verification; Public auditing;
Keywords: حفظ حریم خصوصی; Data de-identification; Data visualization; Privacy preserving; Personally identifiable information; Sensitive personal information;
Keywords: حفظ حریم خصوصی; Big Data; Privacy; security; Big data in healthcare; privacy preserving;
Keywords: حفظ حریم خصوصی; Functional encryption; Hamming distance; Privacy preserving; Searchable encryption;
Keywords: حفظ حریم خصوصی; Privacy preserving; Steganography; Physiological signal; Hamming code;
Keywords: حفظ حریم خصوصی; Cloud storage; Cloud storage auditing; Privacy preserving; Data security;
Keywords: حفظ حریم خصوصی; Human activity recognition; K-NN classification; Multi-party computation; Privacy preserving;
Keywords: حفظ حریم خصوصی; Cloud storage; Data possession checking; Privacy preserving; Homomorphic Invisible Authenticator;
Keywords: حفظ حریم خصوصی; Rough-sets; Privacy preserving; Graph publishing; Online social network;
Keywords: حفظ حریم خصوصی; Compressive sensing; Cloud security; Privacy preserving; Image storage; Watermark detection in the encrypted domain;
Keywords: حفظ حریم خصوصی; Group communications; Security; Non-repudiation; Privacy preserving; Asymmetric group key agreement;
Keywords: حفظ حریم خصوصی; online social networks; user's profiles; privacy preserving; profiles attacks
Keywords: حفظ حریم خصوصی; Privacy preserving; Petri-net; Cohesion; Authorization; Multi-agents; Web service
Keywords: حفظ حریم خصوصی; Anonymization; Data mining; Privacy; Privacy preserving; Privacy preserving techniques; Sensitive data publishing
Keywords: حفظ حریم خصوصی; Mobile cloud computing; Security; Privacy preserving; Reputation mechanism
Keywords: حفظ حریم خصوصی; Optimistic Fair Exchange; Signature; Ambiguity; Privacy preserving;
Keywords: حفظ حریم خصوصی; Privacy preserving; Utility pattern mining; Perturbation; Frequent pattern mining; Data mining;
Keywords: حفظ حریم خصوصی; data sharing; ABBE; ABE; user revocation; partial decryption; privacy preserving;
Keywords: حفظ حریم خصوصی; Cloud computing; Multi-keyword query; Ranked query; Top-k query; Data encryption; Privacy preserving;
Keywords: حفظ حریم خصوصی; Privacy preserving; Reversible data hiding; Image encryption; Prediction error
Keywords: حفظ حریم خصوصی; Privacy preserving; Neighborhood-based collaborative filtering; Differential privacy
Keywords: حفظ حریم خصوصی; Data mining; High-utility itemset; Privacy preserving; PSO algorithm; GA algorithm; Evolutionary algorithms
A Privacy Preserving Algorithm Based on R-constrained Dummy Trajectory in Mobile Social Network
Keywords: حفظ حریم خصوصی; Privacy preserving; mobile social network; trajectory privacy; location-based service; R-constrained dummy trajectory;
Privacy preserving data mining with 3-D rotation transformation
Keywords: حفظ حریم خصوصی; Data perturbation; Variance; Three dimensional rotation; Privacy preserving; Data mining;
Improving k-anonymity based privacy preservation for collaborative filtering
Keywords: حفظ حریم خصوصی; Recommender system; Collaborative filtering; Privacy preserving; Anonymity;
CPP: Towards comprehensive privacy preserving for query processing in information networks
Keywords: حفظ حریم خصوصی; Privacy preserving; Query processing; Information networks;
A secure ECC-based privacy preserving data aggregation scheme for smart grids
Keywords: حفظ حریم خصوصی; Smart grid; Privacy preserving; Confidentiality; Data aggregation; Authentication;
ASA: Against statistical attacks for privacy-aware users in Location Based Service
Keywords: حفظ حریم خصوصی; Location privacy; Privacy preserving; k-anonymity; Information entropy; Location based service (LBS);
CTS-DP: Publishing correlated time-series data via differential privacy
Keywords: حفظ حریم خصوصی; Correlated time-series; Data publishing; Indistinguishability; Privacy preserving; Differential privacy;
Efficient location privacy algorithm for Internet of Things (IoT) services and applications
Keywords: حفظ حریم خصوصی; Privacy preserving; Location privacy; Location based services; k-anonymization;
Distributed Multi-authority Attribute-based Encryption Scheme for Friend Discovery in Mobile Social Networks
Keywords: حفظ حریم خصوصی; Multi-authority; Attribute-based Encryption; Privacy Preserving; Access Control; Profile Matching
JPEG encryption for image rescaling in the encrypted domain
Keywords: حفظ حریم خصوصی; Signal processing; Encrypted domain; Image rescaling; Privacy preserving; Compression; JPEG; Discrete cosine transfrom; Cloud storage;
Spherical microaggregation: Anonymizing sparse vector spaces
Keywords: حفظ حریم خصوصی; Anonymization; Vector space; Privacy preserving; Data mining; Information loss; Sparse data;
Controllable privacy preserving search based on symmetric predicate encryption in cloud storage
Keywords: حفظ حریم خصوصی; Predicate encryption; Privacy preserving; Cloud storage
VANET-based secure taxi service
Keywords: حفظ حریم خصوصی; Taxi booking; Vehicular ad hoc network; Authentication; Privacy preserving; Pseudo identity; Tracking
Secure and privacy preserving keyword searching for cloud storage services
Keywords: حفظ حریم خصوصی; Cloud storage; Security; Privacy preserving; Partial decipherment; Searchable encryption
Cooperative private searching in clouds
Keywords: حفظ حریم خصوصی; Cloud computing; Cooperative; Privacy preserving; Private searching; Cost-effective
HHUIF and MSICF: Novel algorithms for privacy preserving utility mining
Keywords: حفظ حریم خصوصی; Privacy preserving; Utility mining; Data mining
REACT: An RFID-based privacy-preserving children tracking scheme for large amusement parks
Keywords: حفظ حریم خصوصی; RFID; Children tracking; Privacy preserving; Pocket switched network
Data privacy protection in multi-party clustering
Keywords: حفظ حریم خصوصی; Knowledge discovery; Multi DBs; Orthogonal transformation; Privacy preserving; Data perturbation