中和 发表于 2025-3-28 17:11:40

Privacy Assessment of Data Flow Graphs for an Advanced Recommender System in the Smart Grid at early design time; and (ii) based on that assessment we introduce a recommender system for smart grid applications that allows users and vendors to make informed decisions on the deployment, use and active participation in smart grid use cases with respect to their individual privacy.

Consequence 发表于 2025-3-28 20:11:41

Supporting Streaming Data Anonymization with Expressions of User Privacy Preferencesion of buffering. Buffering improves on information loss significantly in comparison with previous solutions. In this paper, we extend the Sakpere and Kayem result to support user privacy expressions. We achieve this by integrating a three-tiered user-defined privacy preference model in data stream

THROB 发表于 2025-3-29 00:09:27

An Efficient Anonymous Authenticated Key Agreement Protocol for Vehicular Ad-Hoc Networks Based on Rithin GeoNetworking messages and evaluate its characteristics regarding the privacy of the participating vehicles. The presented results clearly show that the number of necessary pseudonyms for each vehicle may be reduced considerably when compared to a sole ECIES usage while still maintaining the p

水土 发表于 2025-3-29 04:15:40

Implicit Authentication for Smartphone Securitymodel and 20 s to detect an abnormal user. We also show that the combination of more sensors provides better accuracy. Furthermore, our method enables adjusting the security level by changing the sampling rate.

Aura231 发表于 2025-3-29 08:07:39

The Palm Vein Graph for Biometric Authenticationures for comparing palm vein graphs. Experiments are conducted on a public palm vein database for full and trimmed graphs. For the full graphs, one of the introduced measures, an edge-based similarity, gives a definite improvement in matching accuracies over other published results on the same datab

阻碍 发表于 2025-3-29 14:09:08

EvaBio a New Modular Platform to Evaluate Biometric Systemt template when the number of minutiae is higher than expected by the OCC. The third is based on sensors acquisition module to create databases and made attacks on sensors. The last one is the evaluation module, it permit to visualize results after an evaluation.

宪法没有 发表于 2025-3-29 18:56:20

gehen von der sozialen Determination der unterschiedlichen Geschmäcker aus, erkennen deren entscheidende Differenz als hierarchische: hier Verfeinerung, die nur den privilegierten Klassen offensteht, dort grober Genuß, der den kleinbürgerlichen und proletarischen Klassen angedient wird. Für diese S

machination 发表于 2025-3-29 21:25:05

scherisch Tätigen, doch der neue Sinn für sinnlich schöne, reizvolle Oberflächen fand nur seinen Niederschlag in feuilletonistischen Stilübungen als glanzloser Schmuck einer Wissenschaftsprosa, die ansonsten den in der Soziologie gängigen, abstrakten Jargon variiert.

resistant 发表于 2025-3-30 00:48:48

S. M. Furnellovert acknowledgement of cultural studies’ investment in the university as the location for its specific political ambitions: at a time when ‘New Economy’ discourse heralds information workers as the archetypal labour subjects, it is crucial that academics recognise the extent of their own implicati

Bumble 发表于 2025-3-30 07:43:04

http://reply.papertrans.cn/47/4656/465548/465548_50.png
页: 1 2 3 4 [5] 6
查看完整版本: Titlebook: Information Systems Security and Privacy; First International Olivier Camp,Edgar Weippl,Esma Aïmeur Conference proceedings 2015 Springer I