نتایج جستجو برای: security and privacy
تعداد نتایج: 16851797 فیلتر نتایج به سال:
Privacy in electronic communications receives increased attention in both research and industry forums, stemming from both the users’ needs and from legal and regulatory requirements in national or international context. Privacy in internet-based communications heavily relies on the level of security of the Internet Service Providers (ISPs), as well as on the security awareness of the end users...
Our major contribution in this field is to clarify the differences between two RFID privacy notions: one based on the indistinguishability of two tags (denoted as ind-privacy), and the other based on the unpredictability of the output of a protocol (denoted as unp-privacy). It is proven that ind-privacy is weaker than unp-privacy. Moreover, the minimal (necessary and sufficient) condition on ...
This book presents the topic of RFID Security and Privacy in the framework of pervasive computing. Pervasive computing, sometimes known as ubiquitous computing or “ambient intelligence”, is a human-computer interaction model, wherein information processing is integrated in everyday life. The author argues that, as a growing technology, Radio Frequency IDentification (RFID) has many applications...
Existing Grid technology has been foremost designed with performance and scalability in mind. When using Grid infrastructure for medical applications, privacy and security considerations become paramount. Privacy aspects require a re-thinking of the design and implementation of common Grid middleware components. This chapter describes a novel security framework for handling privacy sensitive in...
The term "Internet of Things (IoT)" expresses a huge network of smart and connected objects which can interact with other devices without our interposition. Radio frequency identification (RFID) is a great technology and an interesting candidate to provide communications for IoT networks, but numerous security and privacy issues need to be considered. In this paper, we analyze the security and ...
As research in cyber security and privacy advances, privacy initiatives should be disseminated to the broader public. Education of this public is a key tool in conveying the seminal importance of security and privacy in our use of digital technology. This article presents a curriculum that, by targeting the nonengineering public, provides an opportunity for rapid acceptance of the innovative se...
The increasing dependency on information systems to process and manage sensitive information requires the usage of development methods that support the development of secure and private information systems. The literature provides examples of methods that focus on security and privacy individually but fail to provide evidence of information systems development methods that consider security and...
During the last decade in particular the levels of critical engagement with the challenges posed for privacy by the new technologies have been on the rise. Many scholars have continued to explore the big themes in a manner which typifies the complex interplay between privacy, identity, security and surveillance. This level of engagement is both welcome and timely, particularly in a climate of g...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید