An effective approach for the protection of user commodity viewing privacy in e-commerce website
Published 2021 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
An effective approach for the protection of user commodity viewing privacy in e-commerce website
Authors
Keywords
E-commerce website, Privacy protection, Privacy model, Information entropy
Journal
KNOWLEDGE-BASED SYSTEMS
Volume 220, Issue -, Pages 106952
Publisher
Elsevier BV
Online
2021-03-18
DOI
10.1016/j.knosys.2021.106952
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- E-Commerce Liability and Security Breaches in Mobile Payment for e-Business Sustainability
- (2019) Se-Hak Chun Sustainability
- Hiding sensitive itemsets with multiple objective optimization
- (2019) Jerry Chun-Wei Lin et al. SOFT COMPUTING
- Blockchain-based accountability for multi-party oblivious RAM
- (2019) Huikang Cao et al. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING
- Privacy Preservation in Location-Based Services
- (2018) Shengling Wang et al. IEEE COMMUNICATIONS MAGAZINE
- Executing multi-dimensional range query efficiently and flexibly over outsourced ciphertexts in the cloud
- (2018) Zhuolin Mei et al. INFORMATION SCIENCES
- Handling Consumer Messages on Social Networking Sites: Customer Service or Privacy Infringement?
- (2018) Joris Demmers et al. INTERNATIONAL JOURNAL OF ELECTRONIC COMMERCE
- A Taxonomy of SME E-Commerce Platforms Derived from a Market-Level Analysis
- (2018) Christopher P. Holland et al. INTERNATIONAL JOURNAL OF ELECTRONIC COMMERCE
- Covering the Sensitive Subjects to Protect Personal Privacy in Personalized Recommendation
- (2018) Zongda Wu et al. IEEE Transactions on Services Computing
- Privacy-Preserving Aggregate Queries for Optimal Location Selection
- (2017) Emre Yilmaz et al. IEEE Transactions on Dependable and Secure Computing
- Enhancing the Description-to-Behavior Fidelity in Android Apps with Privacy Policy
- (2017) Le Yu et al. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING
- An effective approach for the protection of privacy text data in the CloudDB
- (2017) Zongda Wu et al. WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS
- Do security and privacy policies in B2B and B2C e-commerce differ? A comparative study using content analysis
- (2016) Khadija Ali Vakeel et al. BEHAVIOUR & INFORMATION TECHNOLOGY
- Mobile local search with noisy locations
- (2016) Rinku Dewri et al. Pervasive and Mobile Computing
- Constructing plausible innocuous pseudo queries to protect user query intention
- (2015) Zongda Wu et al. INFORMATION SCIENCES
- Mix-zones optimal deployment for protecting location privacy in VANET
- (2014) Yipin Sun et al. Peer-to-Peer Networking and Applications
- TrPF: A Trajectory Privacy-Preserving Framework for Participatory Sensing
- (2013) Sheng Gao et al. IEEE Transactions on Information Forensics and Security
- Supporting Privacy Protection in Personalized Web Search
- (2012) Lidan Shou et al. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING
Find Funding. Review Successful Grants.
Explore over 25,000 new funding opportunities and over 6,000,000 successful grants.
ExploreBecome a Peeref-certified reviewer
The Peeref Institute provides free reviewer training that teaches the core competencies of the academic peer review process.
Get Started