Searched for: +
(41 - 60 of 84)

Pages

document
Ishmaev, G. (author)
Self-sovereign identity (SSI) solutions implemented on the basis of blockchain technology are seen as alternatives to existing digital identification systems, or even as a foundation of standards for the new global infrastructures for identity management systems. It is argued that ‘self-sovereignty' in this context can be understood as the...
journal article 2020
document
Nandakumar, Lakshminarayanan (author), Tillem, G. (author), Erkin, Z. (author), Keviczky, T. (author)
Smart grids promise a more reliable, efficient, economically viable, and environment-friendly electricity infrastructure for the future. State estimation in smart grids plays a pivotal role in system monitoring, reliable operation, automation, and grid stabilization. However, the power consumption data collected from the users during state...
journal article 2019
document
Allhoff, Fritz (author), Henschke, A.H. (author)
This paper surveys foundational ethical issues that attach to the Internet of Things (IoT). In Section 1, we provide an overview of the technology, indicating both current and future applications. Subsequent sections consider particular ethical issues, including: informed consent (Section 2), privacy (Section 3), information security (Section...
journal article 2018
document
Slokom, M. (author), Hanjalic, A. (author), Larson, M.A. (author)
In this paper, we propose a new privacy solution for the data used to train a recommender system, i.e., the user–item matrix. The user–item matrix contains implicit information, which can be inferred using a classifier, leading to potential privacy violations. Our solution, called Personalized Blurring (PerBlur), is a simple, yet effective,...
journal article 2021
document
Ofe, H.A. (author), Minnema, Harm (author), de Reuver, Mark (author)
Purpose: This paper aims to propose a framework for how privacy-preserving technologies (PETs) create business value for organizations. The framework was developed by examining the literature on privacy and information technology’s impact (symbolic and function). The authors evaluate the framework’s applicability using multiparty computation ...
journal article 2022
document
Musick, Geoff (author), Duan, Wen (author), Najafian, S. (author), Sengupta, Subhasree (author), Flathmann, Christopher (author), Knijnenburg, Bart (author), McNeese, Nathan (author)
Newly-formed teams often encounter the challenge of members coming together to collaborate on a project without prior knowledge of each other’s working and communication styles. This lack of familiarity can lead to conflicts and misunderstandings, hindering effective teamwork. Derived from research in social recommender systems, team...
journal article 2024
document
Wang, Wei (author), Liu, Dongli (author), Xu, Peng (author), Yang, Laurence Tianruo (author), Liang, K. (author)
It has become a trend for clients to outsource their encrypted databases to remote servers and then leverage the Searchable Encryption technique to perform secure data retrieval. However, the method has yet to be considered a crucial need for replication on searchable encrypted data. It calls for challenging works on Dynamic Searchable...
journal article 2023
document
Nateghizad, M. (author), Erkin, Z. (author), Lagendijk, R.L. (author)
In smart grids, providing power consumption statistics to the customers and generating recommendations for managing electrical devices are considered to be effective methods that can help to reduce energy consumption. Unfortunately, providing power consumption statistics and generating recommendations rely on highly privacy-sensitive smart...
journal article 2016
document
Mahieu, R.L.P. (author), van Eck, Nees Jan (author), van Putten, D.C. (author), van den Hoven, M.J. (author)
Our lives are increasingly intertwined with the digital realm, and with new technology, new ethical problems emerge. The academic field that addresses these problems—which we tentatively call ‘digital ethics’—can be an important intellectual resource for policy making and regulation. This is why it is important to understand how the new...
journal article 2018
document
Bentinck, S.A. (author), van Oel, C.J. (author), van Dorst, M.J. (author)
Informal face-to-face communication and chance encounters encourage knowledge sharing. This Post-Occupancy Evaluation (POE) examines how well a new building of a Dutch University Institute (DI) supported interaction and perceived privacy among faculty members. The study is designed as a qualitative research project with in-depth interviews...
journal article 2020
document
Ishmaev, G. (author)
This paper looks at the development of blockchain technologies that promise to bring new tools for the management of private data, providing enhanced security and privacy to individuals. Particular interest presents solutions aimed at reorganizing data flows in the Internet of Things (IoT) architectures, enabling the secure and decentralized...
journal article 2019
document
Kraaij, Wessel (author), Verberne, Suzan (author), Koldijk, Saskia (author), de Korte, E.M. (author), van Dantzig, Saskia (author), Sappelli, Maya (author), Hulsebosch, Bob (author), Wabeke, Thymen (author), Neerincx, M.A. (author)
Recent advances in wearable sensor technology and smartphones enable simple and affordable collection of personal analytics. This paper reflects on the lessons learned in the SWELL project that addressed the design of user-centered ICT applications for self-management of vitality in the domain of knowledge workers. These workers often have a...
journal article 2019
document
Wang, Lili (author), Lin, Ye (author), Yao, Ting (author), Xiong, Hu (author), Liang, K. (author)
Existing proxy re-encryption (PRE) schemes to secure cloud data sharing raise challenges such as supporting the heterogeneous system efficiently and achieving the unbounded feature. To address this problem, we proposed a fast and secure unbounded cross-domain proxy re-encryption scheme, named FABRIC, which enables the delegator to authorize...
journal article 2023
document
El-Zawawy, Mohamed A. (author), Lal, C. (author), Conti, M. (author)
With the rapid technological advancement in the Internet of Things (IoT) and Internet of Vehicles (IoV), we witness exponential growth of Connected and Autonomous Vehicles (CAVs). However, these integrations of IoV with other technologies make the IoV network and its interaction between different network components highly complex. Therefore,...
journal article 2023
document
Cardaioli, Matteo (author), Conti, M. (author), Orazi, Gabriele (author), Tricomi, Pier Paolo (author), Tsudik, Gene (author)
Authentication and de-authentication phases should occur at the beginning and end of secure user sessions, respectively. A secure session requires the user to pass the former, but the latter is often underestimated or ignored. Unattended or dangling sessions expose users to well-known Lunchtime Attacks. To mitigate this threat, researchers...
journal article 2023
document
Ding, Aaron Yi (author), van den Boogert, R.J. (author)
With rising numbers of people living in cities leading to increasing congestion and pollution, mobile crowdsensing applications form a potential solution to make transport systems smarter and more efficient. However, sharing data comes with the risk of private information being disclosed. Therefore, a clear incentive is necessary to motivate...
journal article 2023
document
Chiasson, David (author), Lin, Yuan (author), Kok, M. (author), Shull, Peter (author)
Hyperbolic localization measures the time difference of arrivals (TDOAs) of signals to determine the location of a wireless source or receiver. Traditional methods depend on precise clock synchronization between nodes so that time measurements from independent devices can be meaningfully compared. Imperfect synchronization is often the dominant...
journal article 2023
document
Li, Meng (author), Chen, Yifei (author), Lal, C. (author), Conti, M. (author), Martinelli, Fabio (author), Alazab, Mamoun (author)
Security and privacy issues have become a major hindrance to the broad adoption of Ride-Hailing Services (RHSs). In this article, we introduce a new collusion attack initiated by the Ride-Hailing Service Provider (RHSP) and a driver that could easily link the real riders and their anonymous requests (credentials). Besides this attack,...
journal article 2022
document
Li, Meng (author), Chen, Yifei (author), Zhu, Liehaung (author), Zhang, Zijian (author), Ni, Jianbing (author), Lal, C. (author), Conti, M. (author)
Many regions are in urgent need of facial masks for slowing down the spread of COVID-19. To fight the pandemic, people are contributing masks through donation systems. Most existing systems are built on a centralized architecture which is prone to the single point of failure and lack of transparency. Blockchain-based solutions neglect...
journal article 2023
document
Prasad, Nivedita (author)
People like to travel in groups to visit places. Group recommendation systems can be used to recommend an itinerary of "places of interests" (POIs) in an ordered sequence. The order of POIs in the sequence can be explained to group members to increase acceptance of the recommended items. There is a possibility that explanations which reveal...
master thesis 2019
Searched for: +
(41 - 60 of 84)

Pages