-
1Academic JournalService robots and artificial morality: an examination of robot behavior that violates human privacy
المؤلفون: Söderlund, Magnus
المصدر: Journal of Service Theory and Practice, 2023, Vol. 33, Issue 7, pp. 52-72.
-
2Academic Journal
المؤلفون: Rohith, Vallabhaneni
المصدر: Engineering and Technology Journal, 9(07), 4439-4442, (2024-07-16)
مصطلحات موضوعية: IoT, Security Vulnerabilities, Cyber-attacks, Privacy Violations, Mission-Critical Infrastructure
Relation: https://doi.org/10.5281/zenodo.12750015; https://doi.org/10.5281/zenodo.12750016; oai:zenodo.org:12750016
-
3Academic Journal
المؤلفون: Keyan Abdul-Aziz Mutlaq, Vincent Omollo Nyangaresi, Mohd Adib Omar, Zaid Ameen Abduljabbar, Iman Qays Abduljaleel, Junchao Ma, Mustafa A. Al Sibahee
مصطلحات موضوعية: Cell Biology, Science Policy, Biological Sciences not elsewhere classified, transmitted messages vulnerable, session key negotiation, seen considerable minimization, key agreement protocols, greatly enhanced efficiency, formally analyzed using, elliptic curve cryptography, computation complexities compared, power supply quality, although many authentication, power grids, authentication protocol,
%22">xlink ">, uphill task, threat models, smart grids, smart cards, related state, privacy violations, privacy levels, performance perspective, numerous security, incur communication, ideal security, hamming distance, energy consumption, communication technologies -
4Academic Journal
المؤلفون: Aldo Hernandez-Suarez, Gabriel Sanchez-Perez, Linda Karina Toscano-Medina, Hector Manuel Perez-Meana, Jose Portillo-Portillo, Jesus Olivares-Mercado
المصدر: Future Internet, Vol 15, Iss 12, p 397 (2023)
مصطلحات موضوعية: dense neural network, privacy violations, illegal download, BERT, natural language processing, infringing content, Information technology, T58.5-58.64
وصف الملف: electronic resource
-
5Academic Journal
المؤلفون: Sohaib Saleem, Songfeng Lu, Imdad Hussain, Ubaid Ur Rahman, Inam Ul Haq, Asif Javed
مصطلحات موضوعية: EMR Issues, Blockchain, EMR Blockchain, Systematic literature reviews, Information and Privacy Issues, Information Violations, Privacy Violations, Sharing of Information
Relation: https://doi.org/10.5281/zenodo.8285554; https://doi.org/10.5281/zenodo.8285555; oai:zenodo.org:8285555
-
6Academic Journal
المؤلفون: Bernardo Alonso
المصدر: Revista de Filosofia Moderna e Contemporânea, Vol 8, Iss 3, Pp 69-80 (2021)
مصطلحات موضوعية: zero-order privacy violations. privacy. artificial agents. data. information., Philosophy. Psychology. Religion, Philosophy (General), B1-5802
وصف الملف: electronic resource
-
7Academic Journal
المؤلفون: Seiren Ikhtiara
المصدر: Kalijaga Journal of Communication, Vol 1, Iss 2, Pp 155-164 (2020)
مصطلحات موضوعية: teeneger, social media, privacy violations, Communication. Mass media, P87-96
وصف الملف: electronic resource
-
8Academic Journal
المصدر: Wirtschaftsinformatik 2024 Proceedings
مصطلحات موضوعية: Trust, Trust Repair, Privacy Violations, Smart Home, Internet of Things
وصف الملف: application/pdf
Relation: https://aisel.aisnet.org/wi2024/54; https://aisel.aisnet.org/context/wi2024/article/1053/viewcontent/Konopka_Smart_Homes_2C_Smart_Strategies_An_Empirical_Study_344_a.pdf
-
9Academic Journal
المؤلفون: Masur, Philipp K., Trepte, Sabine
المصدر: Masur , P K & Trepte , S 2021 , ' Transformative or Not? How Privacy Violation Experiences Influence Online Privacy Concerns and Online Information Disclosure ' , Human Communication Research , vol. 47 , no. 1 , hqaa012 , pp. 49-74 . https://doi.org/10.1093/hcr/hqaa012
مصطلحات موضوعية: Bayesian Statistics, Longitudinal Analysis, Online Information Disclosure, Online Privacy Concerns, Privacy Violations, /dk/atira/pure/sustainabledevelopmentgoals/peace_justice_and_strong_institutions, name=SDG 16 - Peace, Justice and Strong Institutions
الاتاحة: https://research.vu.nl/en/publications/38e2bb07-fec7-426b-97c0-378db3079a9b
https://doi.org/10.1093/hcr/hqaa012
https://hdl.handle.net/1871.1/38e2bb07-fec7-426b-97c0-378db3079a9b
http://www.scopus.com/inward/record.url?scp=85120180263&partnerID=8YFLogxK
http://www.scopus.com/inward/citedby.url?scp=85120180263&partnerID=8YFLogxK -
10Image
المؤلفون: Keyan Abdul-Aziz Mutlaq, Vincent Omollo Nyangaresi, Mohd Adib Omar, Zaid Ameen Abduljabbar, Iman Qays Abduljaleel, Junchao Ma, Mustafa A. Al Sibahee
مصطلحات موضوعية: Cell Biology, Science Policy, Biological Sciences not elsewhere classified, transmitted messages vulnerable, session key negotiation, seen considerable minimization, key agreement protocols, greatly enhanced efficiency, formally analyzed using, elliptic curve cryptography, computation complexities compared, power supply quality, although many authentication, power grids, authentication protocol,
%22">xlink ">, uphill task, threat models, smart grids, smart cards, related state, privacy violations, privacy levels, performance perspective, numerous security, incur communication, ideal security, hamming distance, energy consumption, communication technologies Relation: https://figshare.com/articles/figure/Login_authentication_and_session_negotiation_phase_/25048927
-
11Image
المؤلفون: Keyan Abdul-Aziz Mutlaq, Vincent Omollo Nyangaresi, Mohd Adib Omar, Zaid Ameen Abduljabbar, Iman Qays Abduljaleel, Junchao Ma, Mustafa A. Al Sibahee
مصطلحات موضوعية: Cell Biology, Science Policy, Biological Sciences not elsewhere classified, transmitted messages vulnerable, session key negotiation, seen considerable minimization, key agreement protocols, greatly enhanced efficiency, formally analyzed using, elliptic curve cryptography, computation complexities compared, power supply quality, although many authentication, power grids, authentication protocol,
%22">xlink ">, uphill task, threat models, smart grids, smart cards, related state, privacy violations, privacy levels, performance perspective, numerous security, incur communication, ideal security, hamming distance, energy consumption, communication technologies Relation: https://figshare.com/articles/figure/System_initialization_and_registration_phases_/25048924
-
12Image
المؤلفون: Keyan Abdul-Aziz Mutlaq, Vincent Omollo Nyangaresi, Mohd Adib Omar, Zaid Ameen Abduljabbar, Iman Qays Abduljaleel, Junchao Ma, Mustafa A. Al Sibahee
مصطلحات موضوعية: Cell Biology, Science Policy, Biological Sciences not elsewhere classified, transmitted messages vulnerable, session key negotiation, seen considerable minimization, key agreement protocols, greatly enhanced efficiency, formally analyzed using, elliptic curve cryptography, computation complexities compared, power supply quality, although many authentication, power grids, authentication protocol,
%22">xlink ">, uphill task, threat models, smart grids, smart cards, related state, privacy violations, privacy levels, performance perspective, numerous security, incur communication, ideal security, hamming distance, energy consumption, communication technologies -
13Image
المؤلفون: Keyan Abdul-Aziz Mutlaq, Vincent Omollo Nyangaresi, Mohd Adib Omar, Zaid Ameen Abduljabbar, Iman Qays Abduljaleel, Junchao Ma, Mustafa A. Al Sibahee
مصطلحات موضوعية: Cell Biology, Science Policy, Biological Sciences not elsewhere classified, transmitted messages vulnerable, session key negotiation, seen considerable minimization, key agreement protocols, greatly enhanced efficiency, formally analyzed using, elliptic curve cryptography, computation complexities compared, power supply quality, although many authentication, power grids, authentication protocol,
%22">xlink ">, uphill task, threat models, smart grids, smart cards, related state, privacy violations, privacy levels, performance perspective, numerous security, incur communication, ideal security, hamming distance, energy consumption, communication technologies -
14
المؤلفون: Keyan Abdul-Aziz Mutlaq, Vincent Omollo Nyangaresi, Mohd Adib Omar, Zaid Ameen Abduljabbar, Iman Qays Abduljaleel, Junchao Ma, Mustafa A. Al Sibahee
مصطلحات موضوعية: Cell Biology, Science Policy, Biological Sciences not elsewhere classified, transmitted messages vulnerable, session key negotiation, seen considerable minimization, key agreement protocols, greatly enhanced efficiency, formally analyzed using, elliptic curve cryptography, computation complexities compared, power supply quality, although many authentication, power grids, authentication protocol,
%22">xlink ">, uphill task, threat models, smart grids, smart cards, related state, privacy violations, privacy levels, performance perspective, numerous security, incur communication, ideal security, hamming distance, energy consumption, communication technologies -
15
المؤلفون: Keyan Abdul-Aziz Mutlaq, Vincent Omollo Nyangaresi, Mohd Adib Omar, Zaid Ameen Abduljabbar, Iman Qays Abduljaleel, Junchao Ma, Mustafa A. Al Sibahee
مصطلحات موضوعية: Cell Biology, Science Policy, Biological Sciences not elsewhere classified, transmitted messages vulnerable, session key negotiation, seen considerable minimization, key agreement protocols, greatly enhanced efficiency, formally analyzed using, elliptic curve cryptography, computation complexities compared, power supply quality, although many authentication, power grids, authentication protocol,
%22">xlink ">, uphill task, threat models, smart grids, smart cards, related state, privacy violations, privacy levels, performance perspective, numerous security, incur communication, ideal security, hamming distance, energy consumption, communication technologies -
16
المؤلفون: Keyan Abdul-Aziz Mutlaq, Vincent Omollo Nyangaresi, Mohd Adib Omar, Zaid Ameen Abduljabbar, Iman Qays Abduljaleel, Junchao Ma, Mustafa A. Al Sibahee
مصطلحات موضوعية: Cell Biology, Science Policy, Biological Sciences not elsewhere classified, transmitted messages vulnerable, session key negotiation, seen considerable minimization, key agreement protocols, greatly enhanced efficiency, formally analyzed using, elliptic curve cryptography, computation complexities compared, power supply quality, although many authentication, power grids, authentication protocol,
%22">xlink ">, uphill task, threat models, smart grids, smart cards, related state, privacy violations, privacy levels, performance perspective, numerous security, incur communication, ideal security, hamming distance, energy consumption, communication technologies -
17
المؤلفون: Keyan Abdul-Aziz Mutlaq, Vincent Omollo Nyangaresi, Mohd Adib Omar, Zaid Ameen Abduljabbar, Iman Qays Abduljaleel, Junchao Ma, Mustafa A. Al Sibahee
مصطلحات موضوعية: Cell Biology, Science Policy, Biological Sciences not elsewhere classified, transmitted messages vulnerable, session key negotiation, seen considerable minimization, key agreement protocols, greatly enhanced efficiency, formally analyzed using, elliptic curve cryptography, computation complexities compared, power supply quality, although many authentication, power grids, authentication protocol,
%22">xlink ">, uphill task, threat models, smart grids, smart cards, related state, privacy violations, privacy levels, performance perspective, numerous security, incur communication, ideal security, hamming distance, energy consumption, communication technologies -
18
المؤلفون: Keyan Abdul-Aziz Mutlaq, Vincent Omollo Nyangaresi, Mohd Adib Omar, Zaid Ameen Abduljabbar, Iman Qays Abduljaleel, Junchao Ma, Mustafa A. Al Sibahee
مصطلحات موضوعية: Cell Biology, Science Policy, Biological Sciences not elsewhere classified, transmitted messages vulnerable, session key negotiation, seen considerable minimization, key agreement protocols, greatly enhanced efficiency, formally analyzed using, elliptic curve cryptography, computation complexities compared, power supply quality, although many authentication, power grids, authentication protocol,
%22">xlink ">, uphill task, threat models, smart grids, smart cards, related state, privacy violations, privacy levels, performance perspective, numerous security, incur communication, ideal security, hamming distance, energy consumption, communication technologies -
19
المؤلفون: Keyan Abdul-Aziz Mutlaq, Vincent Omollo Nyangaresi, Mohd Adib Omar, Zaid Ameen Abduljabbar, Iman Qays Abduljaleel, Junchao Ma, Mustafa A. Al Sibahee
مصطلحات موضوعية: Cell Biology, Science Policy, Biological Sciences not elsewhere classified, transmitted messages vulnerable, session key negotiation, seen considerable minimization, key agreement protocols, greatly enhanced efficiency, formally analyzed using, elliptic curve cryptography, computation complexities compared, power supply quality, although many authentication, power grids, authentication protocol,
%22">xlink ">, uphill task, threat models, smart grids, smart cards, related state, privacy violations, privacy levels, performance perspective, numerous security, incur communication, ideal security, hamming distance, energy consumption, communication technologies -
20
المؤلفون: Keyan Abdul-Aziz Mutlaq, Vincent Omollo Nyangaresi, Mohd Adib Omar, Zaid Ameen Abduljabbar, Iman Qays Abduljaleel, Junchao Ma, Mustafa A. Al Sibahee
مصطلحات موضوعية: Cell Biology, Science Policy, Biological Sciences not elsewhere classified, transmitted messages vulnerable, session key negotiation, seen considerable minimization, key agreement protocols, greatly enhanced efficiency, formally analyzed using, elliptic curve cryptography, computation complexities compared, power supply quality, although many authentication, power grids, authentication protocol,
%22">xlink ">, uphill task, threat models, smart grids, smart cards, related state, privacy violations, privacy levels, performance perspective, numerous security, incur communication, ideal security, hamming distance, energy consumption, communication technologies