• No se han encontrado resultados

security and privacy protection

A privacy protection user authentication and key agreement scheme tailored for the Internet of Things environment: PriAuth

A privacy protection user authentication and key agreement scheme tailored for the Internet of Things environment: PriAuth

... more and more IoT equipment is applied into the medical ...authentication and key agreement scheme tailored for Wireless Sensor ...the privacy problems during the authentication ...the ...

18

Framework for preserving security and privacy in peer to peer content distribution systems

Framework for preserving security and privacy in peer to peer content distribution systems

... pose security and privacy threats to the copyright holders and end users, ...copyright and privacy protection employ cryptographic mechanisms at a cost of high ...

39

A Survey on Security, Privacy and Anonymity in Legal Distribution of Copyrighted Multimedia Content over Peer to Peer Networks

A Survey on Security, Privacy and Anonymity in Legal Distribution of Copyrighted Multimedia Content over Peer to Peer Networks

... to security, another concern among end users is whether the presence of copyright protection mechanism in P2P distribution systems can violate their privacy ...the privacy interests of users ...

30

Automatic system for providing security services in the Internet of Things applications over Wireless Sensor Networks

Automatic system for providing security services in the Internet of Things applications over Wireless Sensor Networks

... environments, and makes it possible to take emergency actions in case to health ...pulse, and body temperature. Data are collected by wearable devices [4] and are periodically sent to the medical ...

6

Framework for privacy aware content distribution in peer to  peer  networks with copyright protection

Framework for privacy-aware content distribution in peer-to- peer networks with copyright protection

... fingerprint and sends the fingerprinted content to the ...computational and communicational ...bandwidth and also fulfils the desired security ...

272

Privacy and Data Protection in a User-Centric Business Model for Telecommunications Services.

Privacy and Data Protection in a User-Centric Business Model for Telecommunications Services.

... platforms and take advantage of the benefits the user- centric approaches provide, thus leveraging new and profitable business ...experience and enhanced ...

15

Version 2.0 JSR 118 Expert Group jsr-118-commentsjcp.org

Version 2.0 JSR 118 Expert Group jsr-118-commentsjcp.org

... In response to a status report, the server MUST reply with a “200 OK” response. No content SHOULD be returned to the device and, if any is sent, it MUST be ignored. If a response is received the request SHOULD NOT ...

566

Annual Report 2012

Annual Report 2012

... Women and Positive Creation: Delivery of the 2011 Annual Report (February) • Federation of Catalan Organisations of The Elderly, Women and Family (FOCAGG) • 7th edition of the United Nations Model, ...

12

Implementation plan for an ISMS according to ISO/IEC 27001:2013

Implementation plan for an ISMS according to ISO/IEC 27001:2013

... Information security policies Organization of information security Human resource security Asset management Access control Cryptography Physical and environmental security Operations sec[r] ...

23

Análisis de la privacidad en Internet

Análisis de la privacidad en Internet

... De este análisis se puede inferir también que las regiones que no están interesadas en la privacidad de Google son la mayoría de los países americanos, ya que si en la búsqueda global no aparecía privacidad google y sin ...

45

WAKING UP TO RISK: CORPORATE RESPONSES HIV/AIDS IN THE WORKPLACE

WAKING UP TO RISK: CORPORATE RESPONSES HIV/AIDS IN THE WORKPLACE

... chemical and related manufacturing and marketing company with a total staff of 30,000 ...resource and co-ordinate its response to HIV/AIDS and to reduce the gap between stated policy ...

68

AMISOM and the Protection of Civilian in Somalia

AMISOM and the Protection of Civilian in Somalia

... operations and the actual delivery of protection activities, a complex mix of skills and expertise is ...personnel, protection begins with a clear understanding of their obligations and ...

57

Descargar
			
			
				Descargar PDF

Descargar Descargar PDF

... relations, and mediations, between the actors with the capacity of generating communicative products and the substance and expression of that ...values and belief systems impressed in media ...

19

Cyberspace and European security

Cyberspace and European security

... unexpected and catastrophic cyberattack equivalent to Pearl ...prevention and management of international crises (including cyber crises) and to assert its strategic interests and autonomy ...

8

Creditor protection and financial cycles

Creditor protection and financial cycles

... economy and previous growth, both their creditor rights measure and the rule of law index come in significant in an OLS regression having the ratio of private debt to GNP as the dependent ...Padilla ...

25

Face recognition and De-Identification in the frequency domain

Face recognition and De-Identification in the frequency domain

... simultaneous and uncontrolled factors, such as se- vere variations of illumination, expression, pose, occlusion and ...errors and/or wrong scales that affect the recognition ...the privacy of ...

130

Terms and Acronyms in Privacy in Telecommunications

Terms and Acronyms in Privacy in Telecommunications

... transport, security, ...areas and managed by Area Directors ...IAB and IESG are chartered by the Internet Society (ISOC) for these ...IESG and of the IETF, and is an ex-officio member ...

12

Informe d'Autors UOC a ISI Web of Knowledge  Maig 2012

Informe d'Autors UOC a ISI Web of Knowledge Maig 2012

... Daradoumis, T.; Martinez-Mones, A., Xhafa, F. (2004). An Integrated Approach for Analysing and Assessing the Performance of Virtual Learning Groups. Groupware: Design, Implementation, and Use, Proceedings. ...

5

To share or not to share: What costumers really think about their personal information

To share or not to share: What costumers really think about their personal information

... knowledge and data analysis specialist, focusing on new market and product developments to ensure, maintain, or improve data quality and participant ...consumer privacy, blending, source ...

11

Show all 10000 documents...

Related subjects