We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 1-20 of 1,743 results
  1. Introduction to Usable Privacy

    This introductory chapter first discusses the significance of privacy and informational self-determination as a basic human right for individuals and...
    Simone Fischer-Hübner, Farzaneh Karegar in The Curious Case of Usable Privacy
    Chapter 2024
  2. Overview of Usable Privacy Research: Major Themes and Research Directions

    A wide variety of literature exists on privacy across different communities and disciplines, including Human-Computer Interaction (HCI). Privacy...
    Simone Fischer-Hübner, Farzaneh Karegar in The Curious Case of Usable Privacy
    Chapter 2024
  3. Challenges of Usable Privacy

    A thorough understanding of usable privacy research challenges is essential for ensuring high-quality research, improving methods and avoiding...
    Simone Fischer-Hübner, Farzaneh Karegar in The Curious Case of Usable Privacy
    Chapter 2024
  4. Considerations and Challenges

    As with any new technology, continuous biometric authentication systems have a variety of considerations and challenges that must be addressed before...
    Chapter 2024
  5. Applied Cryptography

    This chapter illustrates how cryptography can be used to achieve aims other than confidentiality of data. In particular, it can be used to ensure:...
    Chapter 2024
  6. Network Security

    This chapter presents a number of common ways of protecting systems against various forms of attack via the network. These include:...
    Chapter 2024
  7. Incident Handling and System Availability

    This chapter 1 focuses on how to react if, despite all precautions, an attack or other incident leads to a security breach. This is largely a...
    Chapter 2024
  8. Epilogue

    This concluding chapter considers the question of whether in practice t is possible to achieve the aim of having true cybersecurity. It reviews in...
    Chapter 2024
  9. Behavior-Based Detection Method for Android Malware

    The behavior-based Android malware detection method is a method that detects the presence of malicious behavior by observing and analyzing the...
    Weina Niu, **aosong Zhang, ... Jiacheng Gong in Android Malware Detection and Adversarial Methods
    Chapter 2024
  10. Menschen und andere Crown Jewels

    Krisenmanagement erfordert das Setzen von Schwerpunkten. Je nach Ausrichtung der Organisation auf Geschäftsfelder, auf Regionen oder auf Produkte –...
    Holger Kaschner in Cyber Crisis Management
    Chapter 2024
  11. Cyber Crisis (& Security) Grundlagen

    Ob Bewältigung, Prävention oder Präparation: Sämtliche Phasen des Cyber Crisis Managements haben ein gemeinsamens Fundament. Dieses Fundament sind...
    Holger Kaschner in Cyber Crisis Management
    Chapter 2024
  12. Cyber Crisis Preparation

    Ziel und Zweck vorbereitender Maßnahmen ist, die Effizienz der Krisenbewältigung zu steigern. Sämtliche Lösungen erst unter dem unmittelbaren Druck...
    Holger Kaschner in Cyber Crisis Management
    Chapter 2024
  13. Blockchain Technology for E-Governance Applications

    Blockchain technology or distributed ledger technology since its inception as a cryptocurrency platform has captured the imagination of computer...
    Ras Dwivedi, Nilesh Vasita, ... Sandeep Shukla in Blockchains
    Chapter 2024
  14. Decentralized Identity Management and Blockchains: Design Patterns and Architectures

    Securely and efficiently managing digital identities is a pre-requisite to enabling prosperous digital service economy underpinned by trust. The...
    Hye-young Paik, Yue Liu, ... Salil S. Kanhere in Blockchains
    Chapter 2024
  15. Blockchain Technology Accelerating Industry 4.0

    Competitive industrial environments impose significant requirements on data sharing as well as the accountability and verifiability of related...
    Jan Pennekamp, Lennart Bader, ... Klaus Wehrle in Blockchains
    Chapter 2024
  16. Cryptographic Primitives

    Blockchain is a promising and growing technology for providing reliable and secure decentralized solutions. Nevertheless, it encounters many research...
    Mayank Raikwar, Shuang Wu in Blockchains
    Chapter 2024
  17. The Future Ring Confidential Transaction Protocols for Privacy-Preserving Blockchain

    In this chapter, we are going to give some potential future enhancement on the privacy-preserving blockchain protocol, the Ring Confidential...
    Muhammed F. Esgin, Joseph K. Liu, ... Dimaz Ankaa Wijaya in Blockchains
    Chapter 2024
  18. Supply Chain Management Using Blockchain

    Among many domains being disrupted by blockchains, supply chains are at the top, as they naturally involve multi-party collaboration and regulatory...
    Christopher Klinkmueller, H. M. N. Dilum Bandara, ... Qinghua Lu in Blockchains
    Chapter 2024
  19. Implementation of the C4.5 Algorithm in the Internet of Things Applications

    The Internet of Things changes how people perform their daily activities. With data mining techniques, the Internet of Things assists users to...
    Apriandy Angdresey, Lanny Sitanayah, ... Timothy Matthew Immanuel Sumajow in Decision Making and Security Risk Management for IoT Environments
    Chapter 2024
  20. IoMT Applications Perspectives: From Opportunities and Security Challenges to Cyber-Risk Management

    The Internet of Things (IoT) paradigm is gaining popularity since it promotes the development of several smart and innovative applications....
    Sondes Ksibi, Faouzi Jaidi, Adel Bouhoula in Decision Making and Security Risk Management for IoT Environments
    Chapter 2024
Did you find what you were looking for? Share feedback.