[HTML][HTML] Ethical considerations in advanced metering infrastructure integration: A systematic review
Abstract The integration of Advanced Metering Infrastructure (AMI) within energy utility
systems promises significant improvements in efficiency, service delivery, and sustainability …
systems promises significant improvements in efficiency, service delivery, and sustainability …
[HTML][HTML] Privacy protection scheme for mobile social network
In the recent years, popularity and number of users of mobile social networks have grown
significantly. Due to different types of communication on these networks, users share a lot of …
significantly. Due to different types of communication on these networks, users share a lot of …
A trusted social network using hypothetical mathematical model and decision-based scheme
Online social networking is expanding gradually in our professional as well as personal life
in a variety of natures, beliefs, attitudes, and personalities. During communicating through …
in a variety of natures, beliefs, attitudes, and personalities. During communicating through …
[Retracted] Personal Information Security Environment Monitoring and Law Protection Using Big Data Analysis
W Zhu - Journal of Environmental and Public Health, 2022 - Wiley Online Library
This article explores the causes of the issues with personal data privacy and outlines the
limitations of China's current legal framework. This article makes the argument that, in the …
limitations of China's current legal framework. This article makes the argument that, in the …
[PDF][PDF] Security threats and techniques in social networking sites: a systematic literature review
During the decade, interactions among people have gradually changed as a result of the
popularity, availability and accessibility of social networking sites (SNSs). SNSs enhance …
popularity, availability and accessibility of social networking sites (SNSs). SNSs enhance …
Modified hardware security algorithms for process industries using internet of things
JS Prasath, U Ramachandraiah… - Journal of Applied …, 2021 - Taylor & Francis
Embedded devices used in process industries are vulnerable to a variety of attacks due to its
large number of deployments to reduce the measurement and process complexity. The …
large number of deployments to reduce the measurement and process complexity. The …
A novel authorization delegation scheme for multimedia social networks by using proxy re-encryption
W Feng, Z Zhang, J Wang, L Han - Multimedia Tools and Applications, 2016 - Springer
To solve the existing problem of the multimedia social networks platforms, for instance, the
copyrighted or private multimedia content can not be safely shared among users, we …
copyrighted or private multimedia content can not be safely shared among users, we …
Improving security and efciency for encrypted data sharing in online social networks
H Qinlong, M Zhaofeng, Y Yixian… - China …, 2014 - ieeexplore.ieee.org
Despite that existing data sharing systems in online social networks (OSNs) propose to
encrypt data before sharing, the multiparty access control of encrypted data has become a …
encrypt data before sharing, the multiparty access control of encrypted data has become a …
Design and evaluation of a virtual private network architecture for collaborating specialist users
AKR Sistani, AM Patel - Asia-Pacific Journal of Information …, 2016 - journalarticle.ukm.my
The expansion of communication systems is the undeniable advantage of the most
contemporary digital technologies. However, when a specialist user such as an inventor or …
contemporary digital technologies. However, when a specialist user such as an inventor or …
A framework for protecting privacy on mobile social networks
In recent years, mobile social networks have largely been developed and gained
considerable popularity. An approach to protecting privacy on mobile social networks is the …
considerable popularity. An approach to protecting privacy on mobile social networks is the …