Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Privacy

Known as: Right Of Privacy, Privacy right, Personal privacy 
Privacy is the ability of an individual or group to seclude themselves, or information about themselves, and thereby express themselves selectively… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2020
Review
2020
Information-centric networking (ICN) has been proposed as one of the future Internet architectures. It is poised to address the… Expand
  • table I
  • table II
  • figure 1
  • table III
  • figure 2
Review
2019
Review
2019
The Internet of Things (IoT) is the next era of communication. Using the IoT, physical objects can be empowered to create… Expand
  • table 1
  • table 2
  • table 3
  • figure 2
  • figure 3
Review
2019
Review
2019
With the rapid growth of renewable energy resources, the energy trading began to shift from centralized to distributed manner… Expand
  • figure 1
  • figure 2
  • table 1
  • table 2
Review
2019
Review
2019
Internet of things (IoT) is realized by the idea of free flow of information amongst various low-power embedded devices that use… Expand
  • table 1
Review
2019
Review
2019
Abstract In the world scenario, concerns with security and privacy regarding computer networks are always increasing. Computer… Expand
Review
2019
Review
2019
Abstract Blockchain, as a decentralized and distributed public ledger technology in peer-to-peer network, has received… Expand
Review
2019
Review
2019
In the last century, the automotive industry has arguably transformed society, being one of the most complex, sophisticated, and… Expand
  • figure 1
  • figure 2
  • table 1
  • table 2
  • table 2
Review
2019
Review
2019
In recent years, the rapid development of cryptocurrencies and their underlying blockchain technology has revived Szabo’s… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Review
2019
Review
2019
Abstract Internet of Things (IoT) on the Wireless Body Area Network (WBAN) for healthcare applications is an operative scenario… Expand
Review
2017
Review
2017
Legacy encryption systems depend on sharing a key (public or private) among the peers involved in exchanging an encrypted message… Expand
  • figure 1
  • figure 2
  • table I
  • table II
  • figure 3