Results 41 to 50 of about 2,375,414 (378)
A Developer-Friendly Library for Smart Home IoT Privacy-Preserving Traffic Obfuscation
The number and variety of Internet-connected devices have grown enormously in the past few years, presenting new challenges to security and privacy. Research has shown that network adversaries can use traffic rate metadata from consumer IoT devices to ...
Apthorpe, Noah +2 more
core +1 more source
Exploring Consumers’ Attitudes of Smart TV Related Privacy Risks [PDF]
A number of privacy risks are inherent in the Smart TV ecosystem. It is likely that many consumers are unaware of these privacy risks. Alternatively, they might be aware but consider the privacy risks acceptable.
B Debatin +14 more
core +2 more sources
Developing a Secure Internet-based Network of Trusted Data
Our world has not caught up with technology, and as a result has become more dangerous and nefarious with clandestine actors. Learn what reputable organizations, businesses and academic pioneers are doing to preserve digital identity, data provenance ...
Thomas Hardjono, PhD +1 more
doaj +1 more source
Validity and Reliability of the Scale Internet Users’ Information Privacy Concerns (IUIPC)
Internet Users’ Information Privacy Concerns (IUIPC-10) is one of the most endorsed privacy concern scales. It is widely used in the evaluation of human factors of PETs and the investigation of the privacy paradox. Even though its predecessor Concern For
Thomas Gross
semanticscholar +1 more source
The cancer problem is increasing globally with projections up to the year 2050 showing unfavourable outcomes in terms of incidence and cancer‐related deaths. The main challenges are prevention, improved therapeutics resulting in increased cure rates and enhanced health‐related quality of life.
Ulrik Ringborg +43 more
wiley +1 more source
Privacy in (mobile) telecommunications services [PDF]
Telecommunications services are for long subject to privacy regulations. At stake are traditionally: privacy of the communication and the protection of traffic data. Privacy of the communication is legally founded.
J Hoven van den +4 more
core +1 more source
ABSTRACT Objective Epilepsy is increasingly associated with immune dysregulation and inflammation. The T cell receptor (TCR), a key mediator of adaptive immunity, shows repertoire alterations in various immune‐mediated diseases. The unique TCR sequence serves as a molecular barcode for T cells, and clonal expansion accompanied by reduced overall TCR ...
Yong‐Won Shin +12 more
wiley +1 more source
A privacy protection mechanism for numerical control information in Internet of things
The application of numerical control machine tool in the Internet of things has attracted large number of attention. It is a complex network system that integrates sensor network, Internet, and mobile communication network.
Yunfa Li, Mingyi Li
doaj +1 more source
ObjectiveTo study emotional reactions to and behavior intentions about sufferers′ privacy leakage among internet users in China during public health emergencies (PHE) and to provide references for improving government supervision capability and risk ...
Zhi-xin LIU, Jun-ping LIU, Ming-lei SUN
doaj +1 more source
Economic location-based services, privacy and the relationship to identity [PDF]
Mobile telephony and mobile internet are driving a new application paradigm: location-based services (LBS). Based on a person’s location and context, personalized applications can be deployed.
Fritsch, Lothar
core

