Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Transactions on Dependable and Secure Computing"
DOI: 10.1109/tdsc.2021.3077993
Abstract: Internet of Things (IoT) applications build upon resource-constrained, distributed devices that generate data and enable communication. For such applications to be truly trustworthy, it must be ensured that the devices are not compromised by malicious…
read more here.
Keywords:
software;
network;
based remote;
trusted hardware ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "Proceedings of the ACM on Human-Computer Interaction"
DOI: 10.1145/3555538
Abstract: With the rising popularity of photo sharing in online social media, interpersonal privacy violations, where one person violates the privacy of another, have become an increasing concern. Although applying image obfuscations can be a useful…
read more here.
Keywords:
decaying photos;
temporal redactions;
enhanced privacy;
privacy ... See more keywords