2022 | ACM Transactions on Management Information Systems | Citations: 0
Authors: Elkoumy, Gamal; Fahrenkrog-Petersen, Stephan A.; Sani, Mohammadreza Fani; Koschmider, Agnes; Mannhardt, Felix; Von Voigt, Saskia Nuñez; Rafiei, Majid; Waldthausen, Leopold Von
Abstract: Privacy and confidentiality are very important prerequisites for applying proces ... Expand
Semantic filters: cryptanalysis
Topics: privacy process mining General Data Protection Regulation differential privacy legal context
Methods: event log business process modeling conceptual modelling literature study computational algorithm
2019 | HICSS | Citations: 0
Authors: Baccarini, Alessandro N; Hayajneh, Thaier
Abstract: The Internet of Things (IoT) is a network of interconnected low-power sensing de ... Expand
Semantic filters: cryptanalysis
Topics: data encryption internet of things mobile system cryptanalysis Advanced Encryption Standard
Methods: computational algorithm
2011 | Decision Support Systems | Citations: 0
Authors: Kapoor, Gaurav; Zhou, Wei; Piramuthu, Selwyn
Abstract: In any supply chain, there is a high likelihood for individual objects to change ... Expand
Semantic filters: cryptanalysis
Topics: radio frequency identification electronic authentication cryptanalysis data encryption public key encryption