Searched for: subject%3A%22Security%255C%2Band%255C%2BPrivacy%22
(1 - 9 of 9)
document
Pulles, Annemijn (author)
Due to the increasing use of Internet-of-Things (IoT) devices people have created an entirely new digital world for themselves. However, the security and privacy risk in this world are emerging. People using smart devices for everything in their lives are not realising that every interaction is collected and stored in databases. This study has...
master thesis 2022
document
Saidi, Said Jawad (author), Matic, Srdjan (author), Gasser, Oliver (author), Smaragdakis, G. (author), Feldmann, Anja (author)
Internet of Things (IoT) devices are becoming increasingly ubiquitous, e.g., at home, in enterprise environments, and in production lines. To support the advanced functionalities of IoT devices, IoT vendors as well as service and cloud companies operate IoT backendsÐthe focus of this paper. We propose a methodology to identify and locate them...
conference paper 2022
document
Arbabi, Mohammad Salar (author), Lal, C. (author), Veeraragavan, Narasimha Raghavan (author), Marijan, Dusica (author), Nygard, Jan F. (author), Vitenberg, Roman (author)
Continuously generated volumes of health data make healthcare a data-intensive domain. This data needs to be collected, stored, and shared among different healthcare actors for various purposes, such as reporting, analysis, collaborative research, and personalized healthcare services. However, the existing data storage and exchange solutions...
journal article 2022
document
Shariq, Mohd (author), Singh, Karan (author), Lal, C. (author), Conti, M. (author), Khan, Tayyab (author)
Internet of Things (IoT) technologies rapidly evolve and are used in many real-life applications. One of the core technologies used in various IoT applications is Radio Frequency IDentification (RFID) technology. RFID wirelessly and uniquely identifies the tagged objects without a direct line of sight. However, the research community had...
journal article 2022
document
Rashad, Mohamed (author)
Information-Centric Networking (ICN) is a new approach for a more scalable and effective internet. ICN has many benefits, namely: ubiquitous caching, location-independent content routing and content-centric security. Despite the aforementioned benefits, the network paradigm is not ready to replace the current host-centric network as ICN is...
bachelor thesis 2021
document
Sokolov, Mihhail (author)
Information-Centric Networking (ICN) is a common approach to the Internet of the future. However, transitioning to the new Internet architecture right away is impractical if not impossible. Hence, there will be some period of coexistence of ICN and IP. This paper investigates the support of security and privacy features in the three most popular...
bachelor thesis 2021
document
Bourhaeil, Ismail (author), Speksnijder, Erik (author)
Epilepsy is a system-wide phenomenon which manifests physically across the body in various forms such as rapid muscle tone, sweating, elevated heart rate and synchronized neuron firing. Many of these aspects appear ahead of an epileptic incident. If combined together, these aspects are tell-tale signs of an imminent ictal event. Because of these...
bachelor thesis 2021
document
To, Seu Man (author)
The adoption of smart wearable devices has been on the rise over the past few years. These wearables are able to track the user's vital signs, making them valuable for use in the healthcare industry. Sharing this information with the user's healthcare provider has the potential to improve medical care by reducing medical misinformation....
master thesis 2020
document
Nateghizad, M. (author), Maulany, Christian (author), Erkin, Z. (author)
In recent years we have seen a rise in the amount of fitness tracking and self monitoring devices. These devices which often work in conjunction with a smartphone are becoming more accurate and are becoming widely adopted. This trend goes hand in hand with Electronic Health Care (e-health): the shift of health care to the digital domain. E...
conference paper 2017
Searched for: subject%3A%22Security%255C%2Band%255C%2BPrivacy%22
(1 - 9 of 9)