Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2018 at "Wireless Networks"
DOI: 10.1007/978-3-030-01150-5_4
Abstract: The mobile crowdsourcing network (MCN) is a rising network architecture that comprises both crowdsensing and crowdsourcing computing. It has attracted broad attention in the world because of its powerful ability to deal with increasingly hard…
read more here.
Keywords:
security;
mobile crowdsourcing;
privacy issues;
world ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2020 at "Information Systems Frontiers"
DOI: 10.1007/s10796-020-10044-1
Abstract: The complex and interdependent nature of smart cities raises significant political, technical, and socioeconomic challenges for designers, integrators and organisations involved in administrating these new entities. An increasing number of studies focus on the security,…
read more here.
Keywords:
security privacy;
smart city;
smart cities;
security ... See more keywords
Photo from archive.org
Sign Up to like & get
recommendations!
0
Published in 2019 at "Mobile Networks and Applications"
DOI: 10.1007/s11036-018-1150-8
Abstract: In our daily life, we interact with a large number of variety of technological devices for difference purposes, such as accessing documents stored in the cloud, viewing photos and videos, and remotely controlling devices in…
read more here.
Keywords:
privacy internet;
internet things;
editorial security;
security privacy ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2020 at "Mobile Networks and Applications"
DOI: 10.1007/s11036-018-1193-x
Abstract: The rapid development of the Unmanned Aerial Vehicle(UAV) brings much convenience to our life. However, security and privacy problems caused by UAVs are gradually exposed. This paper analyzes UAV safety from three aspects, including sensors,…
read more here.
Keywords:
issues uav;
privacy issues;
security privacy;
privacy ... See more keywords
Photo by neom from unsplash
Sign Up to like & get
recommendations!
0
Published in 2018 at "Multimedia Tools and Applications"
DOI: 10.1007/s11042-018-6426-2
Abstract: In recent years, cyber security and privacy is an essential need for modern society where information technology and services pervade every aspect of our lives. Specially, security and privacy of multimedia big data in the…
read more here.
Keywords:
multimedia big;
big data;
data critical;
security ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2021 at "Computers in biology and medicine"
DOI: 10.1016/j.compbiomed.2020.104130
Abstract: Precision health leverages information from various sources, including omics, lifestyle, environment, social media, medical records, and medical insurance claims to enable personalized care, prevent and predict illness, and precise treatments. It extensively uses sensing technologies…
read more here.
Keywords:
health data;
health;
security privacy;
precision health ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "Enterprise Information Systems"
DOI: 10.1080/17517575.2021.1923066
Abstract: Smart-X is a combination of existing smart technologies that can solve various real-time problems. It is also an emerging trend that can be viewed to be slightly disruptive. There are several technological and regulatory challenges…
read more here.
Keywords:
smart systems;
security privacy;
service;
privacy ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2020 at "IEEE Access"
DOI: 10.1109/access.2020.3015962
Abstract: An increased adoption of mobile health (mHealth) and ubiquitous health (uHealth) systems empower users with handheld devices and embedded sensors for a broad range of healthcare services. However, m/uHealth systems face significant challenges related to…
read more here.
Keywords:
privacy;
uhealth systems;
research;
security privacy ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3204112
Abstract: Digital identities, including names and age, provide modern information systems with valuable data. Identity management is a security feature that enables users to manage and utilize their digital identities when interacting with online services. A…
read more here.
Keywords:
security privacy;
ssi system;
security;
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3227449
Abstract: The Internet of Things (IoT) comprises many technologies, among them is Radio Frequency Identification (RFID), which can be used to track single or multiple objects. This technology has been widely used in healthcare, supply chain,…
read more here.
Keywords:
rfid based;
iot applications;
based iot;
security privacy ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2023 at "IEEE Access"
DOI: 10.1109/access.2023.3267764
Abstract: In recent years, the use of Software Defined Networking (SDN) has increased due to various network management requirements. Using SDN in computer network applications has brought several benefits to users, including lower operational costs, better…
read more here.
Keywords:
based iot;
security privacy;
sdn based;