Results 331 to 340 of about 2,301,308 (387)
Some of the next articles are maybe not open access.
Privacy-Preserving Implicit Authentication Protocol Using Cosine Similarity for Internet of Things
IEEE Internet of Things Journal, 2021Internet of Things provides complicated value-added services to mobile intelligent terminal users. Different sensors collect various data from the users and transmit the data to the mobile intelligent terminal for storage. Consequently, a great amount of
Fushan Wei +4 more
semanticscholar +1 more source
Privacy and the Quantum Internet
Scientific American, 2009The article discusses Internet privacy and the ability for individuals to search the Web without anyone collected personal data. Web searches can reveal personal information about the user despite anonymization. Topics include an in-depth analysis of how a quantum version of the Internet will allow search engines to return answers from user queries ...
openaire +3 more sources
Differential Privacy and IRS Empowered Intelligent Energy Harvesting for 6G Internet of Things
IEEE Internet of Things Journal, 2021In the era of the sixth generation (6G), the deployment of massive Internet of Things (IoT) generates and processes large amounts of data, resulting in high energy demand and huge challenges to the energy-limited IoT devices.
Qianqian Pan +4 more
semanticscholar +1 more source
Privacy issues on the Internet
Proceedings of the 35th Annual Hawaii International Conference on System Sciences, 2003An increasing number of people are using the Internet, in many instances unaware of the information being collected about them. In contrast, other people concerned about the privacy and security issues are limiting their use of the Internet, abstaining from purchasing products online.
W. Chung, J. Paynter
openaire +2 more sources
Shopping for Privacy on the Internet
Journal of Consumer Affairs, 2007Privacy is a concern for all major stakeholders in modern society, and technology to erode privacy continually emerges. Studies show that individuals are concerned about database privacy; yet, they seldom make privacy a salient attribute when deciding among competing alternatives.
openaire +2 more sources
The commodification of privacy on the Internet
Science and Public Policy, 2013This paper critically explores, from a political economy perspective on public policy, the commodification of privacy on the Internet as a practical-economic and a discursive process. On the one hand, dominant online business models conflict structurally with users' need for privacy and the users themselves work on their own powerlessness in this ...
openaire +3 more sources
Differential Privacy-Based Blockchain for Industrial Internet-of-Things
IEEE Transactions on Industrial Informatics, 2020Contemporarily, two emerging techniques, blockchain and edge computing, are driving a dramatical rapid growth in the field of Internet-of-Things (IoT). Benefits of applying edge computing is an adoptable complementarity for cloud computing; blockchain is
Keke Gai +4 more
semanticscholar +1 more source
Privacy in the Internet of Things
2017Internet of Things technology is rapidly gaining popularity, not only in industrial and commercial environments, but also in personal life by means of smart devices at home. The Internet of Things (IoT) spawn new businesses and make buildings, cities and transport smarter.
Jayashree Kanniappan, Babu Rajendiran
openaire +1 more source
OSINT, the Internet and Privacy
2012 European Intelligence and Security Informatics Conference, 2012In just 17 years the Internet has transformed practically every facet of modern life. The launch of Mosaic, the first web browser in 1993 was the catalyst for a communication revolution, whose implications are still unraveling. The Web was always intended to be a two-way multi-user publishing system undermining state controlled one way broadcasting ...
openaire +2 more sources
2012 Fourth International Symposium on Information Science and Engineering, 2012
Internet privacy has become an overlooked yet essential part our everyday lives. At any given moment, while browsing a web page, your identity could be stolen leaving you in thousands of dollars in debt. The purpose of this paper is to aid the general public to become more aware of these issues and the laws pertaining to them.
Maung Maung Htay +3 more
openaire +2 more sources
Internet privacy has become an overlooked yet essential part our everyday lives. At any given moment, while browsing a web page, your identity could be stolen leaving you in thousands of dollars in debt. The purpose of this paper is to aid the general public to become more aware of these issues and the laws pertaining to them.
Maung Maung Htay +3 more
openaire +2 more sources

