Results 51 to 60 of about 2,213,706 (287)

Privacy protection scheme for internet of vehicles based on homomorphic encryption and block chain technology

open access: yes网络与信息安全学报, 2020
In order to solve the problem that the security of traditional internet of vehicles devices is relatively low,which may threaten the privacy of users,a privacy protection scheme based on homomorphic encryption and block chain technology was proposed.This
Ruijin WANG   +3 more
doaj   +3 more sources

Privacy Laws and Privacy by Design Schemes for the Internet of Things

open access: yesACM Computing Surveys, 2021
Internet of Things applications have the potential to derive sensitive information about individuals. Therefore, developers must exercise due diligence to make sure that data are managed according to the privacy regulations and data protection laws ...
Atheer Aljeraisy   +3 more
semanticscholar   +1 more source

Data privacy preservation for the search of Internet of things based on fine-grained authorization

open access: yes网络与信息安全学报, 2017
With the rapid development of the Internet of things (IoT) technology and cloud computing technology, the search engine for Internet of things become a hot research topic.
Jia-hui WANG, Chuan-yi LIU,Bin-xing FANG
doaj   +3 more sources

An Efficient and Secure Data Transmission Mechanism for Internet of Vehicles Considering Privacy Protection in Fog Computing Environment

open access: yesIEEE Access, 2020
Aiming at the problems for existing data transmission mechanisms in Internet of vehicles, such as real-time performance, high efficiency of computing tasks, vehicle data privacy, etc., this paper proposes an efficient and secure data transmission ...
Wenjuan Zhang, Gang Li
doaj   +1 more source

Developing a Secure Internet-based Network of Trusted Data

open access: yesBlockchain in Healthcare Today
Our world has not caught up with technology, and as a result has become more dangerous and nefarious with clandestine actors. Learn what reputable organizations, businesses and academic pioneers are doing to preserve digital identity, data provenance ...
Thomas Hardjono, PhD   +1 more
doaj   +1 more source

DATA PROTECTION POST-MORTEM

open access: yesInternational Comparative Jurisprudence, 2018
This article discusses the notion of the post-mortem privacy of the deceased Internet user and focuses on the post-mortem privacy protection aspects in common and continental law systems.
Asta Tūbaitė-Stalauskienė
doaj   +1 more source

Privacy Awareness Monitoring

open access: yesProblemy Zarządzania, 2019
In this paper, monitoring is perceived as a way to observe how people change their attitude towards privacy, particularly in the Internet circumstances. The paper aims to analyze privacy awareness and the privacy paradox.
Małgorzata Pańkowska
doaj   +1 more source

Privacy in Internet of Things: from Principles to Technologies [PDF]

open access: yes, 2018
Ubiquitous deployment of low-cost smart devices and widespread use of high-speed wireless networks have led to the rapid development of the Internet of Things (IoT). IoT embraces countless physical objects that have not been involved in the traditional Internet and enables their interaction and cooperation to provide a wide range of IoT applications ...
arxiv   +1 more source

Privacy cynicism: A new approach to the privacy paradox

open access: yesCyberpsychology: Journal of Psychosocial Research on Cyberpspace, 2016
Privacy concerns among Internet users are consistently found to be high. At the same time, these concerns do not appear to generate a corresponding wave of privacy protection behavior.
Christian Pieter Hoffmann   +2 more
doaj   +1 more source

Emerging privacy challenges and approaches in CAV systems [PDF]

open access: yes, 2019
The growth of Internet-connected devices, Internet-enabled services and Internet of Things systems continues at a rapid pace, and their application to transport systems is heralded as game-changing.
Atmaca, U. I.   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy