Results 41 to 50 of about 2,213,706 (287)

Blockchain Security and Privacy for the Internet of Things [PDF]

open access: yesSensors, 2021
The Internet of Things (IoT) is of continuously growing interest for research and industry [...]
Marco Picone, Simone Cirani, Luca Veltri
openaire   +5 more sources

Validity and Reliability of the Scale Internet Users’ Information Privacy Concerns (IUIPC)

open access: yesProceedings on Privacy Enhancing Technologies, 2021
Internet Users’ Information Privacy Concerns (IUIPC-10) is one of the most endorsed privacy concern scales. It is widely used in the evaluation of human factors of PETs and the investigation of the privacy paradox. Even though its predecessor Concern For
Thomas Gross
semanticscholar   +1 more source

Emotional responses and behavioral coping mechanism to sufferers′ privacy leakage among Chinese internet users during public health emergencies

open access: yesZhongguo gonggong weisheng, 2022
ObjectiveTo study emotional reactions to and behavior intentions about sufferers′ privacy leakage among internet users in China during public health emergencies (PHE) and to provide references for improving government supervision capability and risk ...
Zhi-xin LIU, Jun-ping LIU, Ming-lei SUN
doaj   +1 more source

Privacy Threats on the Internet of Medical Things [PDF]

open access: yesarXiv, 2022
The Internet of Medical Things (IoMT) is a frequent target of attacks -- compromising both patient data and healthcare infra-structure. While privacy-enhanced technologies and services (PETS) are developed to mitigate traditional privacy concerns, they cannot be applied without identifying specific threat models. Therefore, our position is that the new
arxiv  

The Quest for Privacy in the Internet of Things

open access: yesIEEE Cloud Computing, 2016
The Internet of Things (IoT) is the current evolutionary paradigm of networking and the key driving force toward a smart world. Although privacy in the IoT is highly regarded to ensure the protection of users and personal information from the perspective of individual or cooperative users, it's insufficiently studied. As members of the always-connected
Porambage, Pawani   +5 more
openaire   +5 more sources

Consumer privacy in internet of things [PDF]

open access: yesPressacademia, 2017
Purpose- This study aims to examine privacy from a consumer point of view and in relation to the Internet of Things.  Methodology- The concepts of Internet of Things and consumer privacy are covered in this study. These two phenomena are conceptually evaluated, and the relation between them are analyzed through applications and examples.
Marangoz, Mehmet, Aydin, Ali Emre
openaire   +2 more sources

A privacy protection mechanism for numerical control information in Internet of things

open access: yesInternational Journal of Distributed Sensor Networks, 2017
The application of numerical control machine tool in the Internet of things has attracted large number of attention. It is a complex network system that integrates sensor network, Internet, and mobile communication network.
Yunfa Li, Mingyi Li
doaj   +1 more source

Yes, I know this IoT Device Might Invade my Privacy, but I Love it Anyway! A Study of Saudi Arabian Perceptions [PDF]

open access: yes, 2017
The Internet of Things (IoT) ability to monitor our every move raises many privacy concerns. This paper reports on a study to assess current awareness of privacy implications of IoT devices amongst Saudi Arabians.
Aleisa, Noura, Renaud, Karen
core   +2 more sources

Privacy in the Internet of Things: Threats and Challenges [PDF]

open access: yes, 2015
The Internet of Things paradigm envisions the pervasive interconnection and cooperation of smart things over the current and future Internet infrastructure. The Internet of Things is, thus, the evolution of the Internet to cover the real-world, enabling many new services that will improve people's everyday lives, spawn new businesses and make buildings,
arxiv   +1 more source

ethp2psim: Evaluating and deploying privacy-enhanced peer-to-peer routing protocols for the Ethereum network [PDF]

open access: yesarXiv, 2023
Network-level privacy is the Achilles heel of financial privacy in cryptocurrencies. Financial privacy amounts to achieving and maintaining blockchain- and network-level privacy. Blockchain-level privacy recently received substantial attention. Specifically, several privacy-enhancing technologies were proposed and deployed to enhance blockchain-level ...
arxiv  

Home - About - Disclaimer - Privacy