Federated learning in smart cities: Privacy and security survey
Over the last decade, smart cities (SC) have been developed worldwide. Implementing big
data and the internet of things improves the monitoring and integration of different …
data and the internet of things improves the monitoring and integration of different …
Biometric personal authentication using keystroke dynamics: A review
M Karnan, M Akila, N Krishnaraj - Applied soft computing, 2011 - Elsevier
Authentication is the process of determining whether someone or something is, in fact, who
or what it is declared to be. As the dependence upon computers and computer networks …
or what it is declared to be. As the dependence upon computers and computer networks …
[图书][B] Obfuscation: A user's guide for privacy and protest
F Brunton, H Nissenbaum - 2015 - books.google.com
How we can evade, protest, and sabotage today's pervasive digital surveillance by
deploying more data, not less—and why we should. With Obfuscation, Finn Brunton and …
deploying more data, not less—and why we should. With Obfuscation, Finn Brunton and …
[图书][B] Mobile interfaces in public spaces: Locational privacy, control, and urban sociability
AS e Silva, J Frith - 2012 - taylorfrancis.com
Mobile phones are no longer what they used to be. Not only can users connect to the
Internet anywhere and anytime, they can also use their devices to map their precise …
Internet anywhere and anytime, they can also use their devices to map their precise …
Implementation of terminal middleware platform for mobile RFID computing
N Park - International Journal of Ad Hoc and Ubiquitous …, 2011 - inderscienceonline.com
The typical Radio Frequency Identification (RFID) architecture, defined by EPCglobal,
comprises RFID tags, which are embedded or attached to objects, an RFID reader and …
comprises RFID tags, which are embedded or attached to objects, an RFID reader and …
[图书][B] Constructing location, one check-in at a time: examining the practices of Foursquare users
JH Frith - 2012 - search.proquest.com
This dissertation focuses on the mobile application Foursquare. Foursquare is an example
of a location-based social network (LBSN) and currently has 20 million users and is growing …
of a location-based social network (LBSN) and currently has 20 million users and is growing …
Students' privacy concerns on the use of social media in higher education
L Aymerich-Franch, M Fedele - Digital arts and entertainment …, 2014 - igi-global.com
Social media is principally used by students in the private sphere. However, its
implementation for educational purposes in higher education is rapidly expanding. This …
implementation for educational purposes in higher education is rapidly expanding. This …
[图书][B] Biometría y seguridad
JO García, FA Fernández, RC Belmonte - 2008 - researchgate.net
Con este tercer “Cuaderno de la Cátedra Isdefe” se inicia una serie dedicada a ofrecer unas
monografías sobre tecnologías importantes para el área de la Seguridad. Con rigor …
monografías sobre tecnologías importantes para el área de la Seguridad. Con rigor …
From the national surveillance state to the cybersurveillance state
M Hu - Annual Review of Law and Social Science, 2017 - annualreviews.org
This article anchors the phenomenon of bureaucratized cybersurveillance around the
concept of the National Surveillance State, a theory attributed to Professor Jack Balkin of …
concept of the National Surveillance State, a theory attributed to Professor Jack Balkin of …
Biometric technologies: functionality, emerging trends, and vulnerabilities
JV Di Nardo - Journal of Applied Security Research, 2008 - Taylor & Francis
Biometric identification methods are quickly becoming commonplace in security and access
control applications. This article presents a general overview of various biometric …
control applications. This article presents a general overview of various biometric …