Search
Search Results
-
Introduction to Usable Privacy
This introductory chapter first discusses the significance of privacy and informational self-determination as a basic human right for individuals and... -
Overview of Usable Privacy Research: Major Themes and Research Directions
A wide variety of literature exists on privacy across different communities and disciplines, including Human-Computer Interaction (HCI). Privacy... -
Challenges of Usable Privacy
A thorough understanding of usable privacy research challenges is essential for ensuring high-quality research, improving methods and avoiding... -
Considerations and Challenges
As with any new technology, continuous biometric authentication systems have a variety of considerations and challenges that must be addressed before... -
Applied Cryptography
This chapter illustrates how cryptography can be used to achieve aims other than confidentiality of data. In particular, it can be used to ensure:... -
Network Security
This chapter presents a number of common ways of protecting systems against various forms of attack via the network. These include:... -
Incident Handling and System Availability
This chapter 1 focuses on how to react if, despite all precautions, an attack or other incident leads to a security breach. This is largely a... -
Epilogue
This concluding chapter considers the question of whether in practice t is possible to achieve the aim of having true cybersecurity. It reviews in... -
Behavior-Based Detection Method for Android Malware
The behavior-based Android malware detection method is a method that detects the presence of malicious behavior by observing and analyzing the... -
Menschen und andere Crown Jewels
Krisenmanagement erfordert das Setzen von Schwerpunkten. Je nach Ausrichtung der Organisation auf Geschäftsfelder, auf Regionen oder auf Produkte –... -
Cyber Crisis (& Security) Grundlagen
Ob Bewältigung, Prävention oder Präparation: Sämtliche Phasen des Cyber Crisis Managements haben ein gemeinsamens Fundament. Dieses Fundament sind... -
Cyber Crisis Preparation
Ziel und Zweck vorbereitender Maßnahmen ist, die Effizienz der Krisenbewältigung zu steigern. Sämtliche Lösungen erst unter dem unmittelbaren Druck... -
Blockchain Technology for E-Governance Applications
Blockchain technology or distributed ledger technology since its inception as a cryptocurrency platform has captured the imagination of computer... -
Decentralized Identity Management and Blockchains: Design Patterns and Architectures
Securely and efficiently managing digital identities is a pre-requisite to enabling prosperous digital service economy underpinned by trust. The... -
Blockchain Technology Accelerating Industry 4.0
Competitive industrial environments impose significant requirements on data sharing as well as the accountability and verifiability of related... -
Cryptographic Primitives
Blockchain is a promising and growing technology for providing reliable and secure decentralized solutions. Nevertheless, it encounters many research... -
The Future Ring Confidential Transaction Protocols for Privacy-Preserving Blockchain
In this chapter, we are going to give some potential future enhancement on the privacy-preserving blockchain protocol, the Ring Confidential... -
Supply Chain Management Using Blockchain
Among many domains being disrupted by blockchains, supply chains are at the top, as they naturally involve multi-party collaboration and regulatory... -
Implementation of the C4.5 Algorithm in the Internet of Things Applications
The Internet of Things changes how people perform their daily activities. With data mining techniques, the Internet of Things assists users to... -
IoMT Applications Perspectives: From Opportunities and Security Challenges to Cyber-Risk Management
The Internet of Things (IoT) paradigm is gaining popularity since it promotes the development of several smart and innovative applications....