researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: IJIPSI
Home
Index
Info
Volume
Volume
4
, Issue
4
237
--
260
Wesam Almobaideen
,
Hebatullah Jarboua
,
Khair Eddin Sabri
.
Searchable encryption architectures: survey of the literature and proposing a unified architecture
261
--
275
Dirk Pawlaszczyk
,
Jannik Weber
,
Ralf Zimmermann
,
Christian Hummert
.
Android apps and advertising networks - a survey on data privacy
276
--
295
Sarandis Mitropoulos
,
Antonios Gouglidis
,
Vasileios Giotsas
.
A categorisation of policy conflicts in distributed systems and network management
296
--
313
Lucien Ngalamou
,
Harmony L. Schmidbauer
.
Combating and perpetuating bias: the relationship between bias and computer science
314
--
333
Ronald B. Larson
.
Privacy concerns and actions to reduce privacy risks
Volume
4
, Issue
3
153
--
169
Leila Benarous
,
Benamar Kadri
.
Hybrid pseudonym change strategy for location privacy in VANET: protecting location privacy in VANET
170
--
202
Subrata Bose
.
Commutative encryption: an answer to privacy protected query processing of multi data sources
203
--
225
Jyoti Lamba
,
V. Ch. Venkaiah
.
Privacy-preserving frequent itemset mining in vertically partitioned database using symmetric homomorphic encryption scheme
226
--
236
Chia-Sung Yen
.
The influence of product placement on TV news and journalists self-evaluation of professionalism and private policy
Volume
4
, Issue
2
79
--
93
Rachid Rimani
,
Naima Hadj-Said
,
Adda Ali-Pacha
.
Proposition of a dynamic steganography system based on the chaos properties and image registration for distributing an encryption key
94
--
101
Chonlathip Aswakan
.
Live event creation and management: case of King Bhumibol Adulyadej mourning event
102
--
114
Jirayut Monjagapate
,
Nakorn Rungkittanasan
.
The study of acceptance Thai LGBTQs in Bangkok: analysis of attitudes from Gen-Z people
115
--
133
Albert Kofi Kwansah Ansah
,
Daniel Adu-Gyamfi
,
Stephen Anokye
.
BiSign: pairing-based anonymity in bitcoin cryptocurrency
134
--
152
Michael Mireku Kwakye
.
Privacy-preservation in data pre-processing for web usage mining
Volume
4
, Issue
1
1
--
29
Vikas Tiwari
,
Ajeet Singh
,
Appala Naidu Tentu
.
Differential cryptanalysis on DES cryptosystem up to eight rounds
30
--
48
Hanane Saidi
,
Driss Gretete
,
Adnane Addaim
.
Survey: secure opportunistic routing protocols in wireless networks
49
--
64
El Arbi Abdellaoui Alaoui
,
Mustapha El Moudden
.
Security analysis for intelligent urban freight transport
65
--
78
Asmaa Berdigh
,
Kenza Oufaska
,
Khalid El Yassini
.
2 emission overview: solutions, challenges and opportunities