Semantic Filter
show all semantic filters
Found 3 articles
  • Privacy and Confidentiality in Process Mining: Threats and Research Challenges

    PDF

    2022 | ACM Transactions on Management Information Systems | Citations: 0

    Authors: Elkoumy, Gamal; Fahrenkrog-Petersen, Stephan A.; Sani, Mohammadreza Fani; Koschmider, Agnes; Mannhardt, Felix; Von Voigt, Saskia Nuñez; Rafiei, Majid; Waldthausen, Leopold Von

    Abstract: Privacy and confidentiality are very important prerequisites for applying proces ... Expand

    Semantic filters: cryptanalysis

    Topics: privacy process mining General Data Protection Regulation differential privacy legal context

    Methods: event log business process modeling conceptual modelling literature study computational algorithm

  • Evolution of Format Preserving Encryption on IoT Devices: FF1+

    2019 | HICSS | Citations: 0

    Authors: Baccarini, Alessandro N; Hayajneh, Thaier

    Abstract: The Internet of Things (IoT) is a network of interconnected low-power sensing de ... Expand

    Semantic filters: cryptanalysis

    Topics: data encryption internet of things mobile system cryptanalysis Advanced Encryption Standard

    Methods: computational algorithm

  • Multi-tag and multi-owner RFID ownership transfer in supply chains

    PDF

    2011 | Decision Support Systems | Citations: 0

    Authors: Kapoor, Gaurav; Zhou, Wei; Piramuthu, Selwyn

    Abstract: In any supply chain, there is a high likelihood for individual objects to change ... Expand

    Semantic filters: cryptanalysis

    Topics: radio frequency identification electronic authentication cryptanalysis data encryption public key encryption