Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,180,267 papers from all fields of science
Search
Sign In
Create Free Account
Privacy policy acknowledgment:Find:Pt:^Patient:Doc
Known as:
Privacy policy acknowledgment Doc
, Politica sulla privacy, accettazione:Osservazione:Pt:^Paziente:Doc
, Privacy policy acknowledgment:Finding:Point in time:^Patient:Document
Expand
National Institutes of Health
Create Alert
Alert
Related topics
Related topics
3 relations
Documents
Patients
Privacy policy
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Practical Two-Way QKD-Based Quantum Private Query with Better Performance in User Privacy
Yan Chang
,
Shibin Zhang
,
G. Wan
,
Lili Yan
,
Yan Zhang
,
Xueyang Li
International Journal of Theoretical Physics
2019
Corpus ID: 164672450
Quantum privacy query (QPQ) is a cryptographic application that protects the privacy of both users and databases while querying…
Expand
2018
2018
PCPA: A Practical Certificateless Conditional Privacy Preserving Authentication Scheme for Vehicular Ad Hoc Networks
Yang Ming
,
Xiaoqin Shen
Italian National Conference on Sensors
2018
Corpus ID: 21723613
Vehicle ad hoc networks (VANETs) is a promising network scenario for greatly improving traffic efficiency and safety, in which…
Expand
Highly Cited
2015
Highly Cited
2015
The Convergence of Virtual Reality and Social Networks: Threats to Privacy and Autonomy
Fiachra O’Brolcháin
,
Tim Jacquemard
,
David S. Monaghan
,
N. O’Connor
,
P. Novitzky
,
B. Gordijn
Science and Engineering Ethics
2015
Corpus ID: 6253343
The rapid evolution of information, communication and entertainment technologies will transform the lives of citizens and…
Expand
Highly Cited
2011
Highly Cited
2011
Cinco anos da política nacional de humanização: trajetória de uma política pública
Dário Frederico Pasche
,
E. Passos
,
Élida Azevedo Hennington
2011
Corpus ID: 57875100
This article presents the context of the emergence and implementation of the National Policy of Humanization (NPH), which was…
Expand
2010
2010
Prosser's Privacy Law: A Mixed Legacy
Neil M. Richards
,
Daniel J. Solove
2010
Corpus ID: 54495411
This Article examines the complex ways in which William Prosser shaped the development of the American law of tort privacy…
Expand
Review
2010
Review
2010
Public Access to Information on Private Land Conservation: Tracking Conservation Easements
A. Morris
,
A. Rissman
2010
Corpus ID: 157114660
Conservation easements reveal major tensions between the privacy concerns of landowners and the right of the public to access…
Expand
Review
2010
Review
2010
A Global Review and Annotated Bibliography of Recent Publications
S. Baumeister
,
M. Jandl
,
M. McAdam
,
M. Nicot
2010
Corpus ID: 18844840
The description and classification of countries and territories in this study and the arrangement of the material do not imply…
Expand
Review
2003
Review
2003
Privacy Wrongs in Search of Remedies
J. Reidenberg
2003
Corpus ID: 152725408
The American legal system has generally rejected legal rights for data privacy and relies instead on market self-regulation and…
Expand
2003
2003
Federalism at the Crossroads: Old Meanings, New Significance
Thomas O. Hueglin
Canadian Journal of Political Science/Revue…
2003
Corpus ID: 55596615
Federalism has remained a contested concept. The constitutional certainties of the modern federal state are under attack from…
Expand
2002
2002
Everyday Privacy in Ubiquitous Computing Environments
Scott Lederer
,
A. Dey
,
Jennifer Mankoff
2002
Corpus ID: 18114360
We present a conceptual model of everyday privacy in ubiquitous computing environments, based on the works of Lessig and Adams…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE