


default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 776 matches
- 2025
- Pyoung Won Kim
:
Fog Computing for Artificial Intelligence Digital Textbooks: Educational Scaffolding and Security and Privacy Challenges. Expert Syst. J. Knowl. Eng. 42(2) (2025) - Lichuan Ma
, Lu Zhou, Hang Huang, Youyang Qu, Xuefeng Liu:
EPPDL: An efficient privacy-preserving distributed ledger for digital asset transfer in Web3.0. Future Gener. Comput. Syst. 167: 107735 (2025) - Himanshu Kumar Singh
, Kedar Nath Singh, Amit Kumar Singh
:
Split ways: Using GAN watermarking for digital image protection with privacy-preserving split model training. Future Gener. Comput. Syst. 163: 107523 (2025) - Molly Campbell, Ankur Barthwal, Sandhya Joshi, Austin Shouli, Ajay Kumar Shrestha:
Investigation of the Privacy Concerns in AI Systems for Young Digital Citizens: A Comparative Stakeholder Analysis. CoRR abs/2501.13321 (2025) - Antoine Boutet, Victor Morel:
"I'm not for sale" - Perceptions and limited awareness of privacy risks by digital natives about location data. CoRR abs/2502.11658 (2025) - 2024
- Samuel Wairimu:
Privacy and Security for Digital Health: Assessing Risks and Harms to Users. Karlstad University, Sweden, 2024 - Shalaka S. Mahadik
, Pranav M. Pawar
, Raja Muthalagu
, Neeli Rashmi Prasad, Sin-Kuen Hawkins, Dimitris Stripelis, Sreedhar Rao
, Peter Ejim, Bruce Hecht:
Digital Privacy in Healthcare: State-of-the-Art and Future Vision. IEEE Access 12: 84273-84291 (2024) - Stefanus van Staden
, Nicola J. Bidwell:
Localised Trust in a Globalised Knot: Designing Information Privacy for Digital-ID. ACM J. Comput. Sustain. Soc. 2(1): 5:1-5:37 (2024) - Davide Di Ruscio
, Paola Inverardi, Patrizio Migliarini, Phuong T. Nguyen:
Leveraging privacy profiles to empower users in the digital society. Autom. Softw. Eng. 31(1): 16 (2024) - Tu Lyu, Yulin Guo, Hao Chen:
Understanding the privacy protection disengagement behaviour of contactless digital service users: the roles of privacy fatigue and privacy literacy. Behav. Inf. Technol. 43(10): 2007-2023 (2024) - Seda Özer Sanal
, Büsra Çiçek
:
University students' digital spaces in online learning communities: Implications for understanding, protecting and maintaining privacy. Br. J. Educ. Technol. 55(2): 654-667 (2024) - Yizhou Liu, Kaileigh A. Byrne
, Heba Aly, Reza Ghaiumy Anaraky, Bart P. Knijnenburg:
Can Stress Put Digital Privacy at Risk? Evidence from a Controlled Experiment Examining the Impact of Acute Stress on Privacy Decisions on a Simulated Social Network Site. Cyberpsychology Behav. Soc. Netw. 27(9): 664-672 (2024) - Mehdi Letafati
, Safa Otoum:
Digital Healthcare in the Metaverse: Insights into Privacy and Security. IEEE Consumer Electron. Mag. 13(3): 80-89 (2024) - Sunder Ali Khowaja
, Parus Khuwaja, Kapal Dev
, Weizheng Wang, Lewis Nkenyereye:
ChatGPT Needs SPADE (Sustainability, PrivAcy, Digital divide, and Ethics) Evaluation: A Review. Cogn. Comput. 16(5): 2528-2550 (2024) - Chintan Patel, Aryan Mohammadi Pasikhani
, Prosanta Gope
, John A. Clark:
User-empowered secure privacy-preserving authentication scheme for Digital Twin. Comput. Secur. 140: 103793 (2024) - Shuang Wang, Muhammad Asif, Muhammad Farrukh Shahzad, Muhammad Ashfaq:
Data privacy and cybersecurity challenges in the digital transformation of the banking sector. Comput. Secur. 147: 104051 (2024) - Borja Bordel Sánchez
, Ramón Alcarria
, Latif Ladid, Aurel Machalek
:
Using Privacy-Preserving Algorithms and Blockchain Tokens to Monetize Industrial Data in Digital Marketplaces. Comput. 13(4): 104 (2024) - Iuliia Avgustis
, Samira Ibnelkaïd, Netta Iivari:
Occupying Another's Digital Space: Privacy of Smartphone Users as a Situated Practice. Comput. Support. Cooperative Work. 33(4): 605-643 (2024) - Muhammad Tukur, Jens Schneider, Mowafa Said Househ, Ahmed Haruna Dokoro, Usman Idris Ismail
, Muhammad Dawaki, Marco Agus:
The metaverse digital environments: a scoping review of the challenges, privacy and security issues. Frontiers Big Data 6 (2024) - Jinkyung Katie Park
, Mamtaj Akter
, Pamela J. Wisniewski
, Karla Badillo-Urquiola
:
It's Still Complicated: From Privacy-Invasive Parental Control to Teen-Centric Solutions for Digital Resilience. IEEE Secur. Priv. 22(5): 52-62 (2024) - Weiwei Zhang
, Jianing Yin, Ka I Chan, Tongxin Sun, Tongtong Jin, Jihong Jeung, Jiangtao Gong
:
Beyond digital privacy: Uncovering deeper attitudes toward privacy in cameras among older adults. Int. J. Hum. Comput. Stud. 192: 103345 (2024) - Wendy Moncur:
Mosaics of Personal Data: Digital Privacy During Times of Change. Interactions 31(5): 24-27 (2024) - Yuan Chen, Jia-Nan Liu
, Anjia Yang
, Jian Weng
, Min-Rong Chen
, Zilin Liu, Ming Li
:
PACDAM: Privacy-Preserving and Adaptive Cross-Chain Digital Asset Marketplace. IEEE Internet Things J. 11(8): 13424-13436 (2024) - Kangkang Sun
, Jun Wu
, Ali Kashif Bashir
, Jianhua Li
, Hansong Xu
, Qianqian Pan
, Yasser D. Al-Otaibi
:
Personalized Privacy-Preserving Distributed Artificial Intelligence for Digital-Twin-Driven Vehicle Road Cooperation. IEEE Internet Things J. 11(22): 35902-35916 (2024) - Zhufeng Suo
, Chao Xia
, Donghua Jiang
, Haipeng Peng
, Fenghua Tong
, Xiaoming Chen:
Multitiered Reversible Data Privacy Protection Scheme for IoT Based on Compression Sensing and Digital Watermarking. IEEE Internet Things J. 11(7): 11524-11539 (2024) - John Owoicho Odeh
, Xiaolong Yang
:
Industrial-Internet-of-Things-Based Digital Twin and Metaverse Privacy and Security Measures for a Trustworthy Industrial Metaverse Ecosystem. IT Prof. 26(6): 28-34 (2024) - Syed Sardar Muhammad, Bidit Lal Dey, Hilol Bala, Sharifah Faridah Syed Alwi, Yousra Asaad:
A Typology and Model of Privacy- and Security-Concerned Users' Attitudes toward Digital Footprints and the Consequent Influence on Their Social Media Adaptation. J. Assoc. Inf. Syst. 25(5): 6 (2024) - Simge Özdal-Oktay
, Sven Heitmann
, Christian Kray
:
Linking location privacy, digital sovereignty and location-based services: a meta review. J. Locat. Based Serv. 18(1): 1-52 (2024) - Marija Kustelega
, Renata Mekovec
, Ahmed Shareef
:
Privacy and security challenges of the digital twin: systematic literature review. J. Univers. Comput. Sci. 30(13): 1782-1806 (2024) - Amiya Karmakar, Pritam Ghosh, Partha Sarathi Banerjee, Debashis De:
Jurisprudence: blockchain enabled privacy preserving framework complying digital ethics. Multim. Tools Appl. 83(34): 81107-81126 (2024)
skipping 746 more matches
loading more results
failed to load more results, please try again later

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2025-03-23 18:21 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint