41,930 Hits in 3.4 sec

Secure Computation on 4G/5G Enabled Internet-of-Things

Karl Andersson, Ilsun You, Rahim Rahmani, Vishal Sharma
2019 Wireless Communications and Mobile Computing  
At the same time, the threat of the cyberattacks and issues with mobile internet security is becoming increasingly severe, which introduces new challenges for the security of IoT systems and applications  ...  Analysis of IoT data helps provide smart services such as smart homes, smart energy, smart health, and smart environments through G and G technologies.  ...  Acknowledgments As always, we appreciate the high quality submissions from authors and the support of the community of reviewers. Karl Andersson Ilsun You Rahim Rahmani Vishal Sharma  ... 
doi:10.1155/2019/3978193 fatcat:53y6dwmzdrewhadmuswyh5uoja


2012 Issues in Information Systems  
M-commerce can be conducted anywhere and anytime on a mobile platform, and can be location aware. It has opened a new door to the next generation of e-commerce.  ...  All of these will help identify major issues facing m-commerce and can lead to future advanced studies on m-commerce.  ...  Among these issues, the consumers' concerns over privacy have become a major issue that can affect their intentions of engaging in m-commerce transactions.  ... 
doi:10.48009/2_iis_2012_394-396 fatcat:rsd5hnwgfva2bj4emdi7mx3rcq

Mobile Collaborative Technologies and Data Science for Smart Systems

Nelson A. Baloian, Wolfram Luther, José A. Pino, Tomoo Inoue
2019 Mobile Information Systems  
To ensure data quality, accurate results and reliable (visual) analysis support in human-centered artificial intelligence applications, additional collaboration issues, and privacy and security requirements  ...  e main source and asset for making smart systems are data, which our information age made easily accessible. e next main challenge we face is to effectively and efficiently extract knowledge from huge  ...  e main source and asset for making smart systems are data, which our information age made easily accessible. e next main challenge we face is to effectively and efficiently extract knowledge from huge  ... 
doi:10.1155/2019/8432754 fatcat:lexeketde5h4hhyrkmtrl3reyy

Distributed Secure Computing for Smart Mobile IoT Networks

Vishal Sharma, Daniel G. Reina, Zengpeng Li, Kathiravan Srinivasan, Navuday Sharma, Vinod Karar
2022 Mobile Information Systems  
Acknowledgments e guest editors appreciate the high-quality submissions from the authors and the timely support of reviewers.  ...  a wide range of security and privacy issues in distributed computing related to IoT, blockchain, resource manipulation, industrial control systems, credit cards, smart homes, and aerial networks.  ...  Conflicts of Interest e guest editors declare that they have no conflicts of interest regarding the publication of this special issue. Vishal Sharma Daniel G.  ... 
doi:10.1155/2022/9864846 fatcat:73xdc3momza2bignrcg4vxhq4q

Security and Privacy for Smart Cyber-Physical Systems

Liran Ma, Yan Huo, Chunqiang Hu, Wei Li
2019 Security and Communication Networks  
Conflicts of Interest e editors declare that they have no conflicts of interest regarding the publication of this Special Issue.  ...  We would like to thank all the authors for their great contributions to the Special Issue of Security and Privacy for Smart Cyber-Physical Systems and thank all anonymous reviewers for their valuable comments  ... 
doi:10.1155/2019/7045862 fatcat:olzsecsaljfj5ilay2tohjt6cu

An OAuth2-based protocol with strong user privacy preservation for smart city mobile e-Health apps

Victor Sucasas, Georgios Mantas, Ayman Radwan, Jonathan Rodriguez
2016 2016 IEEE International Conference on Communications (ICC)  
These privacy issues should be addressed so that citizens, concerned about privacy leakage, will embrace Smart City mobile e-Health applications and reap their benefits.  ...  However, accessing personalized e-Health services through citizens' mobile e-Health applications, running on their mobile devices, raises many privacy issues in terms of citizens' identity and location  ...  Nevertheless, these identity and location privacy issues will prevent citizens, concerned about privacy leakage, from embracing Smart City mobile e-Health apps and reaping their benefits.  ... 
doi:10.1109/icc.2016.7511598 dblp:conf/icc/SucasasMRR16 fatcat:fcdkznf74baermd6gmuack7wja

Research on Data Security and Privacy Protection of Wearable Equipment in Healthcare

Dawei Jiang, Guoquan Shi, Yang Gao
2021 Journal of Healthcare Engineering  
This article investigates data from healthcare wearable devices, from technical, management, and legal aspects, and studies data security and privacy protection issues for healthcare wearable devices to  ...  protect data security and user privacy and promote the sustainable development of the healthcare wearable device industry and the scientific use of data collection.  ...  Acknowledgments is work was supported by the Jilin Province Department of Science and Technology under Grant 2020-00005005383.  ... 
doi:10.1155/2021/6656204 pmid:33628404 pmcid:PMC7884134 fatcat:xuvo75mnvzhgrp4cwtgxconkku

Smart Cities: A Survey on Security Concerns

Sidra Ijaz, Munam Ali, Abid Khan, Mansoor Ahmed
2016 International Journal of Advanced Computer Science and Applications  
A smart city is developed, deployed and maintained with the help of Internet of Things (IoT).  ...  However, the function and operation of a smart city is subject to the pivotal development of security architectures. The contribution made in this paper is twofold.  ...  Such 619 | P a g e smart applications can infect the smart-phone devices and may cause many security and information privacy issues.  ... 
doi:10.14569/ijacsa.2016.070277 fatcat:67muv424trfq3ikrzwoi7kfujy

Payment and privacy: A key for the development of NFC mobile

Jean Claude Pailles, Chrystel Gaber, Vincent Alimi, Marc Pasquet
2010 2010 International Symposium on Collaborative Technologies and Systems  
Given the characteristics of the mobile phone market, this trend could grow quickly and importantly.  ...  This paper considers the possible impact of this evolution in term of privacy, focusing on a typical and important case: payment transactions.  ...  Of course this issue on privacy appears also for many transactions systems, whether they are smart card based or not.  ... 
doi:10.1109/cts.2010.5478490 dblp:conf/cts/PaillesGAP10 fatcat:puswzuhvprfbndnsdavywd7p3m

Requirements for Security, Privacy, and Trust in the Internet of Things [Guest Editors' Introduction]

Sabah Mohammed, Tai-hoon Kim, Wai Chi Fang
2021 IEEE Security and Privacy  
m a r t E n v i r o n m e n t s S m a r t S e r v i c e s S m a rt U til iti e s S m a rt T ra n sp o rt a tio n Smart City Security and Privacy Threats IEEE Security & Privacy January  ...  The four articles together give a sense of the breadth of technology issues with smart cities.  ... 
doi:10.1109/msec.2020.3037624 fatcat:4vkmvsintrbjphgawcdw6qfdjy

Mobile Social Networks: Architecture, Privacy, Security Issues and Solutions

Vimitha R Vidhya Lakshmi, Gireesh Kumar T
2017 Journal of Communications  
Following sections are comprised of details on architecture and architectural components of Mobile social networks, privacy and security issues, challenges and some existing solutions.  ...  At the end, some proposed privacy and security solutions and future directions are discussed and suggested on Mobile social networking.  ...  Security and Privacy Issues or Challenges Some of the major privacy and security issues in MSNs are given below: Direct anonymity issue: The attackers try to find out the user's identity and other information  ... 
doi:10.12720/jcm.12.9.524-531. fatcat:suttgxkaxfcmlo5zgisqhszh6m

Smart Phone and Social Media Security and Privacy Management by Students of National Polytechnic University Institute, Bamenda, Cameroon

Njodzefe Nestor, Fobang Geraldine
2019 The International Journal of Humanities & Social Studies  
., Terzi, E., & Getoor, L. (2012) asserts that the proliferation of educational mobile apps that can easily be obtained in online stores for free puts students into privacy and security risks such as identify  ...  Most of new generation smart phones, PDA"s and tablets have inbuilt capability to host mobile apps. Mobile apps provide fast, easy collaboration among participants.  ... 
doi:10.24940/theijhss/2019/v7/i5/hs1905-004 fatcat:bicwubbme5fuphlc6dagowsvum

Using NFC Phones for Proving Credentials [chapter]

Gergely Alpár, Lejla Batina, Roel Verdult
2012 Lecture Notes in Computer Science  
In this way, secure authentication can be obtained by means of anonymous credentials, implemented on a smart card to provide the functionality with minimal data disclosure.  ...  In this paper we propose a new solution for mobile payments called Tap2 technology. To use it, users need only their NFC-enabled mobile phones and credentials implemented on their smart cards.  ...  A smart card carries an anonymous credential issued by a trusted issuing authority IP. Although a user can have several smart cards in practice, we assume only one smart card in a protocol run.  ... 
doi:10.1007/978-3-642-28540-0_26 fatcat:2xy27a7jmbb7zl5p47c7nsc7ca

Security and Privacy in Emerging Wireless Networks

Qing Yang, Rongxing Lu, Yacine Challal, Maryline Laurent
2017 Security and Communication Networks  
Acknowledgments We would also like to thank all the reviewers who have participated in the review process of the articles submitted to this special issue.  ...  This includes security and privacy protection in IoT system, mobile cloud, smart phone, smart city, content centric network, and body area networks.  ...  The paper titled "Secure and Privacy-Preserving Data Sharing and Collaboration in Mobile Healthcare Social Networks of Smart Cities" studies how to achieve secure and privacy-preserving data sharing in  ... 
doi:10.1155/2017/5618742 fatcat:klu7wh6qwjda5oplbdz3qandjy

Architectural implications of smart city business models: an evolutionary perspective

Catherine E. A. Mulligan, Magnus Olsson
2013 IEEE Communications Magazine  
Privacy issues were covered in more detail by Martinez in last month's issue of this magazine.  ...  In addition to issues of monopoly, the use of data that can potentially identify individuals raises multiple privacy and civil rights issues.  ... 
doi:10.1109/mcom.2013.6525599 fatcat:3kchl5bmanh35bgzvwljcofehy
« Previous Showing results 1 — 15 out of 41,930 results