Results 121 to 130 of about 2,213,706 (287)

Privacy Preservation Techniques (PPTs) in IoT Systems: A Scoping Review and Future Directions [PDF]

open access: yesarXiv
Privacy preservation in Internet of Things (IoT) systems requires the use of privacy-enhancing technologies (PETs) built from innovative technologies such as cryptography and artificial intelligence (AI) to create techniques called privacy preservation techniques (PPTs). These PPTs achieve various privacy goals and address different privacy concerns by
arxiv  

Privacy Preservation Technologies in Internet of Things [PDF]

open access: yesInternational Journal BITM Transactions on EECC, Vol. 1, No. 4, pp. 496 - 504, August 2009, 2010
Since the beginning of the Internet thirty years ago, we have witnessed a number of changes in the application of communication technologies. Today, the Internet can be described to a large extent as a ubiquitous infrastructure that is always accessible.
arxiv  

Beyond Concern: Understanding Net Users' Attitudes About Online Privacy [PDF]

open access: yesarXiv, 1999
People are concerned about privacy, particularly on the Internet. While many studies have provided evidence of this concern, few have explored the nature of the concern in detail, especially for the online environment. With this study, we have tried to better understand the nature of online privacy concerns; we look beyond the fact that people are ...
arxiv  

Efficient Proxy-Based Internet Media Distribution Control and Privacy Protection Infrastructure [PDF]

open access: green, 2006
Songqing Chen   +4 more
openalex   +1 more source

Security and Privacy in Future Internet Architectures - Benefits and Challenges of Content Centric Networks [PDF]

open access: yesarXiv, 2016
As the shortcomings of our current Internet become more and more obvious, researchers have started creating alternative approaches for the Internet of the future. Their design goals are mainly content-orientation, security, support for mobility and cloud computing. The probably most popular architecture is called Content Centric Networking.
arxiv  

Evaluating the Contextual Integrity of Privacy Regulation: Parents' IoT Toy Privacy Norms Versus COPPA

open access: yes, 2019
Increased concern about data privacy has prompted new and updated data protection regulations worldwide. However, there has been no rigorous way to test whether the practices mandated by these regulations actually align with the privacy norms of affected
Apthorpe, Noah   +2 more
core  

Home - About - Disclaimer - Privacy