Searched for: +
(1 - 20 of 48)

Pages

document
Stokkink, Q.A. (author)
The digital world is evolving toward representing - and serving the interconnection of - natural persons. Instead of depending on the intrastructure of Big Tech companies and governments, users can cooperate and use their hardware to form public infrastructure. Instead of existing by virtue of a reference in some institution's database, users...
doctoral thesis 2024
document
Coggins, T.N. (author)
In the introduction of this thesis, I contend that robot ethics, as a research field, generally treats privacy as the appropriate distribution of information, and therefore overlooks privacy concerns raised by robots beyond this conceptualization’s purview. I illustrate this contention by evaluating a hypothetical case involving a household...
doctoral thesis 2024
document
Li, Meng (author), Shen, Yanzhe (author), Ye, Guixin (author), He, Jialing (author), Zheng, Xin (author), Zhang, Zijian (author), Zhu, Liehuang (author), Conti, M. (author)
Digital forensics is crucial to fight crimes around the world. Decentralized Digital Forensics (DDF) promotes it to another level by channeling the power of blockchain into digital investigations. In this work, we focus on the privacy and security of DDF. Our motivations arise from (1) how to track an anonymous- and-malicious data user who...
journal article 2024
document
Li, Meng (author), Chen, Yifei (author), Lal, C. (author), Conti, M. (author), Alazab, Mamoun (author), Hu, Donghui (author)
Vehicular Digital Forensics (VDF) is essential to enable liability cognizance of accidents and fight against crimes. Ensuring the authority to timely gather, analyze, and trace data promotes vehicular investigations. However, adversaries crave the identity of the data provider/user, damage the evidence, violate evidence jurisdiction, and leak...
journal article 2023
document
Ye, Hanting (author), Lan, G. (author), Jia, Jinyuan (author), Wang, Q. (author)
Smartphones are moving towards the fullscreen design for better user experience. This trend forces front cameras to be placed under screen, leading to Under-Screen Cameras (USC). Accordingly, a small area of the screen is made translucent to allow light to reach the USC. In this paper, we utilize the translucent screen's features to...
book chapter 2023
document
Xu, Li (author), Li, T. (author), Erkin, Z. (author)
Verifiable Credential (VC) is a new standard proposed by the W3C association to facilitate the expression and verification of third-party-verified credentials on the Internet, such as passports or diplomas. However, the current VC data model lacks an explicit revocation design that guarantees the secure operations of the system, which limits its...
conference paper 2023
document
Colenberg, Susanne (author), Romero Herrera, Natalia (author), Keyson, David (author)
Background and aim - Lack of privacy is a prominent issue in contemporary offices. This study aimed to identify interior design features that jointly influence satisfaction with privacy and noise in the office workspace, and estimate their predictive power. This knowledge can inform strategic workplace design. Methods - Eight design features...
conference paper 2022
document
Li, Meng (author), Zhu, Liehuang (author), Zhang, Zijian (author), Lal, C. (author), Conti, M. (author), Alazab, Mamoun (author)
Traffic monitoring services collect traffic reports and respond to users' traffic queries. However, the reports and queries may reveal the user's identity and location. Although different anonymization techniques have been applied to protect user privacy, a new security threat arises, namely, n-by-1 jamming attack, in which an anonymous...
journal article 2022
document
Colenberg, S.E. (author), Romero Herrera, N.A. (author), Keyson, D.V. (author)
Background and aim – Lack of privacy is a prominent issue in contemporary offices. This study aimed to identify interior design features that jointly influence satisfaction with privacy and noise in the office workspace, and estimate their predictive power. This knowledge can inform strategic workplace design.<br/>Methods – Eight design features...
conference paper 2022
document
Colenberg, S.E. (author), Romero Herrera, N.A. (author), Keyson, D.V. (author)
The prolonged working from home during the recent pandemic has increased awareness of the social function of the office: employees missed informal social interaction with co-workers, face-to-face meetings, and spontaneous encounters. If the trend of hybrid working persists, one of the main functions of the physical office will be to support face...
conference paper 2022
document
Strohmeier, Martin (author), Olive, Xavier (author), Sun, Junzi (author)
The usage of large private and business jets, from those owned by Elon Musk to Kylie Jenner and Bernard Arnault, has recently attracted considerable attention in many countries. Enabled by open and crowdsourced aircraft tracking systems based on the automatic dependent surveillance–broadcast protocol, the aircraft and their owners have been...
journal article 2022
document
Dorronzoro-Zubiete, Enrique (author), Rivera-Romero, Octavio (author), Giunti, Guido (author), Sevillano, José Luis (author)
The lifespan of older people is growing together with their proportion in the population growth in the older population. This leads to an increasing need for support services for older adults who will inevitably experience a significant decrease in their cognitive capabilities and mental health conditions. Cognitive functions, including...
book chapter 2022
document
Li, Meng (author), Gao, Jianbo (author), Zhu, Liehuang (author), Zhang, Zijian (author), Lal, C. (author), Conti, M. (author), Alazab, Mamoun (author)
Ride-Hailing Service (RHS) has drawn plenty of attention as it provides transportation convenience for riders and financial incentives for drivers. Despite these benefits, riders risk the exposure of sensitive location data during ride requesting to an untrusted Ride-Hailing Service Provider (RHSP). Our motivation arises from repetitive...
journal article 2022
document
Hutiri, Wiebke (author), Ding, Aaron Yi (author)
In an age of surveillance capitalism, anchoring the design of emerging smart services in trustworthiness is urgent and important. Edge Intelligence, which brings together the fields of AI and Edge computing, is a key enabling technology for smart services. Trustworthy Edge Intelligence should thus be a priority research concern. However,...
conference paper 2022
document
Teng, Y. (author), Song, Y. (author)
For proper implementation of digital contact tracing technologies for fighting against SARS-CoV-2, participants' privacy vulnerability and the uncertainty from the relevant institutions' side could be seen as two core elements that should be dealt with, among others. In this paper, we propose to understand the current approaches for preserving...
journal article 2022
document
Li, Qiongxiu (author), Lopuhaä-Zwakenberg, Milan (author), Heusdens, R. (author), Christensen, Mads Græsbøll (author)
Both communication overhead and privacy are main concerns in designing distributed computing algorithms. It is very challenging to address them simultaneously as encryption methods required for privacy-preservation often incur high communication costs. In this paper, we argue that there is a fundamental link between communication efficiency...
conference paper 2022
document
Miller, S.R.M. (author), Smith, Marcus (author)
This article considers individual rights and fundamental tenets of the criminal justice system in the context of DNA evidence, in particular recent advancements in genomics that have significantly advanced law enforcement investigative capabilities in this area. It discusses a technique known as Investigative Genetic Genealogy (IGG) which...
journal article 2022
document
Li, Meng (author), Chen, Yifei (author), Lal, C. (author), Conti, M. (author), Martinelli, Fabio (author), Alazab, Mamoun (author)
Security and privacy issues have become a major hindrance to the broad adoption of Ride-Hailing Services (RHSs). In this article, we introduce a new collusion attack initiated by the Ride-Hailing Service Provider (RHSP) and a driver that could easily link the real riders and their anonymous requests (credentials). Besides this attack,...
journal article 2022
document
Smith, Marcus (author), Miller, S.R.M. (author)
Genomic data is growing in importance as scientific knowledge and technology develop, and in availability, as direct-to-consumer genomic health testing and recreational genealogy services become more widely utilized. Access to genomic data needs to be considered in light of individual privacy. Cross-sector use of genomic health and ancestry data...
journal article 2021
document
Rikken, O.K. (author), Janssen, M.F.W.H.A. (author), Roosenboom-Kwee, Z. (author), Büttgen, Marion (author), Dicenta, Julia (author), Spohrer, Kai (author), Venkatesh, Viswanath (author), Raman, Rajalakshmi (author), Hoehle, Hartmut (author), De Keyser, Arne (author)
As blockchain technology is maturing to be confidently used in practice, its applications are becoming evident and, correspondingly, more blockchain research is being published, also extending to more domains than before. To date, scientific research in the field has predominantly focused on subject areas such as finance, computer science, and...
journal article 2021
Searched for: +
(1 - 20 of 48)

Pages