The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The rapid development of wellness smart devices and apps, such as Fitbit Coach and FitnessGenes, has triggered a wave of interaction on social networks. People communicate with and follow each other based on their wellness activities. Though such IoT devices and data provide a good motivation, they also expose users to threats due to the privacy leakage of social networks. Anonymization techniques...
Bitcoin is a kind of novel distributed electronic cash free of any governmental influence and supervision. Its irreversibility, pseudonymity and unforgeability have made great developmental leaps in means of payment and investment management. However, when the application of the means of payment is applied in small and medium-sized enterprises or companies, bitcoin lacks the mechanism to be jointly...
In Ubiquitous Healthcare System (U-Healthcare), authentication is an essential task for secure medical information transmissions. In a recent paper, Kim proposed a smartcardbased authentication scheme for privacy preservation in UHealthcare. This scheme can protect user context privacy and is believed to have many abilities to resist a range of attacks, even though the secret data stored on the smartcard...
Electronic Health Record (EHR) systems have an abundance of convenience for telediagnosis, medical data sharing and management. The main obstacle for wide adoption of EHR systems is due to the privacy concerns of patients. In this work, we propose a role-based access control (RBAC) scheme for EHR systems to secure private EHRs. In our RBAC, there are two main types of roles, namely independent patients...
Vehicular ad hoc networks (VANETs) have recently attract extensive attentions as a promising technology for improving traffic safety and efficiency. To make VANETs practical, security, privacy and efficiency are important issues. Anonymity preserving of group signature and lower overhead in verification of batch signature make these two kinds of signatures right tools to design VANET communication...
Vehicular ad hoc networks (VANETs) are being designed to convenience traffic, keep safety and provide services to drivers. To meet this goal, the vehicles involved should be trustworthy which eagerly needs valid V2V, V2I, I2V authentication. As to the authentication models used in VANETs, many organizations and research centers have done lots of work. The latest authentication models used in VANETs...
Secure and fine-grained access control could hardly be guaranteed in today's centralized social networks which imply to totally delegate to the social networking management system the administration of user data. This paper presents an access control scheme based on relation declaration. In this scenario, social networking sites provide basic applications of social service while users' resources are...
Today's social networking sites don't satisfy the decentralization nature of web 2.0, and face a lot of privacy concerns. This paper presents an access control scheme based on semi-decentralization. In this scenario, social networks sites only provide basic application services while users' resources are managed by themselves in client side. User declares the Relation types with their friends, Authorized...
Though security and privacy are two important issues in vehicular networks, limited works are done on the design of communication protocol until recently. Several proposals tackle these issues in the cryptographic way, such as using group signature to construct vehicular communication protocol. The proprieties of anonymity and traceability make group signature to the purpose to be used in designing...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.