Results 311 to 320 of about 2,375,414 (378)
Some of the next articles are maybe not open access.
Privacy-Aware Point-of-Interest Category Recommendation in Internet of Things
IEEE Internet of Things Journal, 2022In location-based social networks (LBSNs), extensive user check-in data incorporating user preferences for location is collected through Internet of Things devices, including cell phones and other sensing devices.
Lianyong Qi +5 more
semanticscholar +1 more source
IEEE Internet of Things Journal, 2022
Recently, the rapid developments in the Internet of Medical Things (IoMT) enable smart devices to generate and transmit massive personal electronic medical records (EMRs). However, there are many sensitive attributes in an EMR, which could be accessed by
Guangjun Wu +3 more
semanticscholar +1 more source
Recently, the rapid developments in the Internet of Medical Things (IoMT) enable smart devices to generate and transmit massive personal electronic medical records (EMRs). However, there are many sensitive attributes in an EMR, which could be accessed by
Guangjun Wu +3 more
semanticscholar +1 more source
An Informative Security and Privacy “Nutrition” Label for Internet of Things Devices
IEEE Security and Privacy, 2022Consumers are concerned about the security and privacy of their Internet of Things (IoT) devices. However, they cannot easily learn about their devices’ security protections and data practices before purchasing them.
Pardis Emami Naeini +3 more
semanticscholar +1 more source
IEEE Internet of Things Journal, 2021
This article presents research challenges and a tutorial on performance evaluation of blockchain-based security and privacy systems for the Internet of Things (IoT).
M. Ferrag, Lei Shu
semanticscholar +1 more source
This article presents research challenges and a tutorial on performance evaluation of blockchain-based security and privacy systems for the Internet of Things (IoT).
M. Ferrag, Lei Shu
semanticscholar +1 more source
PrivacyGuide: Towards an Implementation of the EU GDPR on Internet Privacy Policy Evaluation
IWSPA@CODASPY, 2018Nowadays Internet services have dramatically changed the way people interact with each other and many of our daily activities are supported by those services.
W. Tesfay +4 more
semanticscholar +1 more source
A Survey on Intelligent Internet of Things: Applications, Security, Privacy, and Future Directions
IEEE Communications Surveys and TutorialsThe rapid advances in the Internet of Things (IoT) have promoted a revolution in communication technology and offered various customer services. Artificial intelligence (AI) techniques have been exploited to facilitate IoT operations and maximize their ...
Ons Aouedi +6 more
semanticscholar +1 more source
A Privacy-Preserving and Scalable Authentication Protocol for the Internet of Vehicles
IEEE Internet of Things Journal, 2021One of the most important and critical requirements for the Internet of Vehicles (IoV) is security under strict latency. Typically, authentication protocols for vehicular ad hoc networks need to authenticate themselves frequently. This results in reduced
M. Aman, Uzair Javaid, B. Sikdar
semanticscholar +1 more source
P2SF-IoV: A Privacy-Preservation-Based Secured Framework for Internet of Vehicles
IEEE transactions on intelligent transportation systems (Print), 2021With the development of Internet of Vehicles (IoV), the integration of Internet of Things (IoT) and manual vehicles becomes inevitable in Intelligent Transportation Systems (ITS).
Randhir Kumar +4 more
semanticscholar +1 more source
2012 Fourth International Symposium on Information Science and Engineering, 2012
Internet privacy has become an overlooked yet essential part our everyday lives. At any given moment, while browsing a web page, your identity could be stolen leaving you in thousands of dollars in debt. The purpose of this paper is to aid the general public to become more aware of these issues and the laws pertaining to them.
Chen-Chi Shing +3 more
openaire +1 more source
Internet privacy has become an overlooked yet essential part our everyday lives. At any given moment, while browsing a web page, your identity could be stolen leaving you in thousands of dollars in debt. The purpose of this paper is to aid the general public to become more aware of these issues and the laws pertaining to them.
Chen-Chi Shing +3 more
openaire +1 more source
A Decentralized Location Privacy-Preserving Spatial Crowdsourcing for Internet of Vehicles
IEEE transactions on intelligent transportation systems (Print), 2021With the rapid development of Internet of Vehicles (IoV), vehicle-based spatial crowdsourcing (SC) applications have been proposed and widely applied to various fields. However, location privacy leakage is a serious issue in spatial crowdsourcing because
Junwei Zhang +5 more
semanticscholar +1 more source

