Akademska digitalna zbirka SLovenije - logo

Rezultati iskanja

Osnovno iskanje    Izbirno iskanje   
Iskalna
zahteva
Knjižnica

Trenutno NISTE avtorizirani za dostop do e-virov konzorcija SI. Za polni dostop se PRIJAVITE.

1 2
zadetkov: 11
1.
  • A Comprehensive Study of Se... A Comprehensive Study of Security and Privacy Guidelines, Threats, and Countermeasures: An IoT Perspective
    Abdul-Ghani, Hezam Akram; Konstantas, Dimitri Journal of sensor and actuator networks, 04/2019, Letnik: 8, Številka: 2
    Journal Article
    Recenzirano
    Odprti dostop

    As Internet of Things (IoT) involvement increases in our daily lives, several security and privacy concerns like linkability, unauthorized conversations, and side-channel attacks are raised. If they ...
Celotno besedilo
Dostopno za: NUK, UL, UM, UPUK

PDF
2.
  • Analysing privacy in visual... Analysing privacy in visual lifelogging
    Ferdous, Md Sadek; Chowdhury, Soumyadeb; Jose, Joemon M. Pervasive and mobile computing, September 2017, 2017-09-00, Letnik: 40
    Journal Article
    Recenzirano
    Odprti dostop

    The visual lifelogging activity enables a user, the lifelogger, to passively capture images from a first-person perspective and ultimately create a visual diary encoding every possible aspect of her ...
Celotno besedilo
Dostopno za: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UL, UM, UPCLJ, UPUK, ZRSKP

PDF
3.
  • A Study on Security and Pri... A Study on Security and Privacy Guidelines, Countermeasures, Threats: IoT Data at Rest Perspective
    Abdulghani, Hezam Akram; Nijdam, Niels Alexander; Collen, Anastasija ... Symmetry (Basel), 06/2019, Letnik: 11, Številka: 6
    Journal Article
    Recenzirano
    Odprti dostop

    The Internet of Things (IoT) makes our lives much easier, more valuable, and less stressful due to the development of many applications around us including smart cities, smart cars, and smart grids, ...
Celotno besedilo
Dostopno za: IZUM, KILJ, NUK, PILJ, PNG, SAZU, UL, UM, UPUK

PDF
4.
  • Analysis on Security and Pr... Analysis on Security and Privacy Guidelines: RFID-Based IoT Applications
    Abdulghani, Hezam Akram; Nijdam, Niels Alexander; Konstantas, Dimitri IEEE access, 2022, Letnik: 10
    Journal Article
    Recenzirano
    Odprti dostop

    The Internet of Things (IoT) comprises many technologies, among them is Radio Frequency Identification (RFID), which can be used to track single or multiple objects. This technology has been widely ...
Celotno besedilo
Dostopno za: NUK, UL, UM, UPUK
5.
  • Evaluation of websites’ com... Evaluation of websites’ compliance to legal and ethical guidelines: A fuzzy logic–based methodology
    Mamakou, Xenia J; Kardaras, Dimitris K; Papathanassiou, Eleutherios A Journal of information science, 08/2018, Letnik: 44, Številka: 4
    Journal Article
    Recenzirano

    Privacy issues are a top priority in web design. However, websites’ evaluation methods do not consider legal and ethical issues. This article proposes a fuzzy logic–based methodology for evaluating ...
Celotno besedilo
Dostopno za: NUK, OILJ, SAZU, UKNU, UL, UM, UPUK
6.
Celotno besedilo
Dostopno za: NUK, PRFLJ, UL, UM, UPUK
7.
  • On the (Un)Reliability of Privacy Policies in Android Apps
    Verderame, Luca; Caputo, Davide; Romdhana, Andrea ... 2020 International Joint Conference on Neural Networks (IJCNN), 2020-July
    Conference Proceeding
    Odprti dostop

    The access to privacy-sensitive information on Android is a growing concern in the mobile community. Albeit Google Play recently introduced some privacy guidelines, it is still an open problem to ...
Celotno besedilo
Dostopno za: IJS, NUK, UL, UM

PDF
8.
  • On the relative importance ... On the relative importance of privacy guidelines for ambient health care
    van de Garde-Perik, Evelien; Markopoulos, Panos; de Ruyter, Boris ACM International Conference Proceeding Series; Vol. 189: Proceedings of the 4th Nordic conference on Human-computer interaction: changing roles; 14-18 Oct. 2006, 10/2006
    Conference Proceeding
    Odprti dostop

    We present an empirical study regarding the relative importance of complying with privacy related guidelines in the context of a Health Monitoring System. Participants were confronted with text ...
Celotno besedilo
Dostopno za: NUK, UL

PDF
9.
  • The principle of security s... The principle of security safeguards: Unauthorized activities
    Dayarathna, Rasika The computer law and security report, 2009, 2009-1-00, 20090101, Letnik: 25, Številka: 2
    Journal Article

    The principle of information security safeguards is a key information privacy principle contained in every privacy legislation measure, framework, and guideline. This principle requires data ...
Celotno besedilo
Dostopno za: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UL, UM, UPCLJ, UPUK
10.
  • Commissioner misleads by av... Commissioner misleads by avoiding hard questions on PKI
    Graham GREENLEAF PRIVACY LAW AND POLICY REPORTER, 09/2001, Letnik: 8, Številka: 5
    Journal Article

    The Australian Federal Privacy Commissioner has drafted Guidelines on the privacy implications for individuals of public key infrastructure - 'Draft PKI Privacy Guidelines' - contain many pro-privacy ...
Celotno besedilo
Dostopno za: NUK, UL, UM, UPUK
1 2
zadetkov: 11

Nalaganje filtrov