[HTML][HTML] Evolution of web tracking protection in Chrome

R Pan, A Ruiz-Martínez - Journal of Information Security and Applications, 2023 - Elsevier
In our society, protecting users' privacy is of utmost importance, especially when users
access websites. Increased awareness of privacy concerns has led web browsers to …

An identity-based elliptic curve cryptography for mobile payment security

OR Vincent, TM Okediran, AA Abayomi-Alli… - SN Computer …, 2020 - Springer
Security breaches have been observed in different dimensions in mobile payment system.
The violation of user's privacy is a common phenomenon in mobile payment transactions …

Blockchain‐based video forensics and integrity verification framework for wireless Internet‐of‐Things devices

S Mercan, M Cebe, RS Aygun, K Akkaya… - Security and …, 2021 - Wiley Online Library
A camera footage which is essential for forensic investigations can easily be modified with
advanced video tampering techniques. This makes it necessary to employ novel methods to …

Aiming at methods' wider adoption: applicability determinants and metrics

R Leszczyna - Computer Science Review, 2021 - Elsevier
Numerous computer science methods and techniques have been proposed by the scientific
community. However, depending on the domain, only their minor fraction has met wider …

Semantic diversity: Privacy considering distance between values of sensitive attribute

K Oishi, Y Sei, Y Tahara, A Ohsuga - Computers & Security, 2020 - Elsevier
A database that contains personal information and is collected by crowdsensing can be
used for various purposes. Therefore, database holders may want to share their databases …

IPSadas: identity‐privacy‐aware secure and anonymous data aggregation scheme

P Ren, F Li, Y Wang, H Zhou… - International Journal of …, 2022 - Wiley Online Library
Intelligent systems are technologically advanced machines that can sense and respond to
the surrounding environment. They have been widely used in medicine, military …

Detecting new generations of threats using attribute‐based attack graphs

MA Nia, B Bahrak, M Kargahi… - IET Information Security, 2019 - Wiley Online Library
In recent years, the increase in cyber threats has raised many concerns about security and
privacy in the digital world. However, new attack methods are often limited to a few core …

A Literature Study: How Digital Advertisements Communicate with Children

L Darmawan - Jurnal Interaksi: Jurnal Ilmu Komunikasi, 2024 - jurnal.umsu.ac.id
The internet provides a lot of space for advertisers to show various information related to
commercial products and services. Both through websites and applications, advertisements …

Review on GPS spoofing‐based time synchronisation attack on power system

H Zhang, S Peng, L Liu, S Su… - IET Generation …, 2020 - Wiley Online Library
Power utilities implement cyber‐security defence with a philosophy of defence in‐depth.
Firewall and air‐gapped systems are widely used to harden cybersecurity defence of critical …

Hands off my data: Users' security concerns and intention to adopt privacy enhancing technologies

F Mangiò, D Andreini, G Pedeliento - Italian Journal of Marketing, 2020 - Springer
As the number of data leak scandals and data infringements increase by the day, people are
becoming more concerned than ever about their online security. As a result, software and …