نتایج جستجو برای: Similar Privacy Setting

تعداد نتایج: 944992  

There are some critical privacy concerns in the current online social networks (OSNs). Users' information is disclosed to different entities that they were not supposed to access. Furthermore, the notion of friendship is inadequate in OSNs since the degree of social relationships between users dynamically changes over the time. Additionally, users may define similar privacy settings for their f...

Deimary, Nima , Dorri, Ali , Jabbaran, Fatemeh , Talisch, Gholamreza ,

Privacy as a human need, is the result of adjustment of the interaction between human environment, which under the influence of current patterns of activity and cultural background, leads to a favorable atmosphere. Adjusting the privacy in Iranian homes is one of the fundamental features of Iranian architecture, which has had a profound effect on the formation of the spatial organization and th...

Journal: :Journal of Biomedical Informatics 2016

Journal: :journal of computing and security 0
bahman rajabi shahid beheshti university, g.c., tehran, iran ziba eslami department of computer science, shahid beheshti university, g.c., tehran, iran

in 2003, waters, felten and sahai introduced a novel cryptographic primitive called incomparable public key cryptosystem to protect anonymity of message receivers in an untrusted network. in this setting, a receiver is allowed to create many anonymous identities for himself without divulging the fact that all these identities refer to the same receiver. recently, lee and lim improved the soluti...

آزاد ارمکی, تقی, انوشه, منیره, حیدری, محمدرضا, محمدی, عیسی ,

Introduction: Ethics, customs, and divine and human values in all scientific and non-academic issues are accepted among all human societies in different eras. The purpose of this study was to understand the experiences of nursing professionals about the patient's privacy. Methods: 21 participants were selected by theoretical sampling which was guided by emerging categories. All participants we...

Aim: The purpose of this study was to review the privacy statement of the American top public libraries and provide privacy statement for users of public libraries in Iran. Method: The research method is a combination of descriptive survey and Delphi library. The research community consisted of 25 American public libraries based on the rankings of the American Library Association's libraries. T...

2006
Constantinos Neophytou Tristan Henderson

Recent advances in mobile computing enable many new applications, yet at the same time create privacy implications caused by the increasing amount of data that becomes available. This thesis will explore the possibilities of wireless-enabled portable devices and their attending privacy implications. We will describe how such a device containing personal information about the musical preferences...

2010

Popularity of the social media like Facebook, Flickr, LinkedIn and others has increasing everyday due its various features provided. Some of the features are to collaborate with friends, good and friendly user interface to share data and multimedia content at ease. Data uploaded to Social network by the user are at high risk of vulnerability. User uploaded data on the social media does play vit...

Journal: :IEEE Transactions on Information Forensics and Security 2021

In machine learning, boosting is one of the most popular methods that designed to combine multiple base learners into a superior one. The well-known Boosted Decision Tree classifier has been widely adopted in data mining and pattern recognition. With emerging challenge privacy, personal images, browsing history, financial reports, which are held by individuals entities more likely contain sensi...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید