Protecting sensitive data in the information age: State of the art and future prospects

C Stach, C Gritti, J Bräcker, M Behringer, B Mitschang - Future Internet, 2022 - mdpi.com
The present information age is characterized by an ever-increasing digitalization. Smart
devices quantify our entire lives. These collected data provide the foundation for data-driven …

Exploring the relationship between host self-description and consumer purchase behavior using a self-presentation strategy

Y Yan, B Lu, T Xu - Systems, 2023 - mdpi.com
Information on short-term rental platforms plays an important role in consumer purchase
behavior. However, information asymmetry between host and guest has been identified as a …

Trusted Location Sharing on Enhanced Privacy-Protection IoT Without Trusted Center

B Lian, J Cui, H Chen, X Zhao, F Wang… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
Many IoT applications require users to share their devices' location, and enhanced privacy-
protection means sharing location anonymously, unlinkably and without relying on any …

Quick Response Code Technology-based Contact Tracing Solutions to Mitigate Epidemic Outbreaks: A Review

AO Adikpe, EE Agbon, AM Giwa… - Pakistan Journal of …, 2023 - journals.uol.edu.pk
Several epidemics and pandemics have plagued humanity over the years; however, the
coronavirus disease 2019 (COVID-19) pandemic revealed humanity's lack of preparedness …

A novel deception-based scheme to secure the location information for iobt entities

B Alkanjr, I Mahgoub - IEEE Access, 2023 - ieeexplore.ieee.org
The Internet of Battlefield Things (IoBT) is a subdomain of the Internet of Things (IoT) that
applies to a battlefield. Due to the limited communication infrastructure, the entities in the …

Advancing medical data classification through federated learning and blockchain incentive mechanism: implications for modern software systems and applications

H Yu, L Cai, H Min, X Su - The Journal of Supercomputing, 2024 - Springer
The key issue of medical data is patient information sensitivity and dataset finiteness, which
need to guarantee high-efficient training. Besides, the current convolutional neural network …

A collaborative approach using neural networks for BLE-RSS lateration-based indoor positioning

P Pascacio, J Torres–Sospedra… - … Joint Conference on …, 2022 - ieeexplore.ieee.org
In daily life, mobile and wearable devices with high computing power, together with anchors
deployed in indoor en-vironments, form a common solution for the increasing demands for …

User sensitive information protection scheme based on blockchain technology

S Luo - Mobile Information Systems, 2022 - Wiley Online Library
With the continuous development of mobile applications and location technology, k‐
anonymity technology is usually used to protect the privacy and security of users in location …

Location-based service information disclosure on social networking sites: The effect of privacy calculus, subjective norms, trust, and cultural difference

T Van Binh, DT Minh, LTH Linh… - Information Services & …, 2023 - content.iospress.com
Along with the development of social networking sites, sharing location is becoming
mainstream, offering many opportunities and promoting sustainable business performance …

Secure electronic monitoring of sex offenders

F Buccafurri, V De Angelis, MF Idone… - Journal of Reliable …, 2024 - Springer
Electronic monitoring is a viable approach to controlling sex offenders and making the
environment safe for victims. Two technologies are currently being adopted: RFID and GPS …