Semantic Filter
show all semantic filters
Found 9 articles
  • The Impact of Gamification on Students’ Learning Outcome and Career Interest in Cybersecurity Education

    2022 | Americas Conference on Information Systems | Citations: 0

    Authors: Zhong, Chen; Kim, J. B. (Joo Baek); Liu, Hong

    Abstract: Effective cybersecurity education is a critical domain in addressing the shorta ... Expand

    Semantic filters: symmetric-key encryption

    Topics: IT security IT career gamification intrinsic motivation digital signature

    Methods: statistical hypothesis test longitudinal research structural equation modeling cross sectional survey cross sectional research

  • Secure attribute-based search in RFID-based inventory control systems

    PDF

    2020 | Decision Support Systems | Citations: 0

    Authors: Doss, Robin; Trujillo-Rasua, Rolando; Piramuthu, Selwyn

    Abstract: We develop a secure attribute-based search protocol for Radio Frequency Identifi ... Expand

    Semantic filters: symmetric-key encryption

    Topics: radio frequency identification privacy public key encryption electronic authentication data encryption

    Methods: machine learning

  • Evolution of Format Preserving Encryption on IoT Devices: FF1+

    2019 | HICSS | Citations: 0

    Authors: Baccarini, Alessandro N; Hayajneh, Thaier

    Abstract: The Internet of Things (IoT) is a network of interconnected low-power sensing de ... Expand

    Semantic filters: symmetric-key encryption

    Topics: data encryption internet of things mobile system cryptanalysis Advanced Encryption Standard

    Methods: computational algorithm

  • BPDIMS:A Blockchain-based Personal Data and Identity Management System

    2019 | HICSS | Citations: 0

    Authors: Faber, Benedict; Michelet, Georg; Weidmann, Niklas; Mukkamala, Raghava Rao; Vatrapu, Ravi

    Abstract: Recent scandals on the abuse of personal information from social media platforms ... Expand

    Semantic filters: symmetric-key encryption

    Topics: blockchain identity management General Data Protection Regulation legal context data encryption

    Methods: archival research computational algorithm design artifact design guideline design science

  • A Synchronized Shared Key Generation Method for Maintaining End-to-End Security of Big Data Streams

    2017 | HICSS | Citations: 0

    Authors: Puthal, Deepak; Nepal, Surya; Ranjan, Rajiv; Nepal, Surya; Chen, Jinjun

    Abstract: A large number of mission critical applications ranging from disaster management ... Expand

    Semantic filters: symmetric-key encryption

    Topics: big data electronic authentication data encryption stream processing Java

    Methods: experiment simulation computational algorithm literature study

  • From a Barrier to a Bridge: Data-Privacy in Deregulated Smart Grids

    2012 | International Conference on Information Systems | Citations: 0

    Authors: Strüker, Jens; Kerschbaum, Florian

    Abstract: The introduction of so-called smart meters involves detailed consumption data. W ... Expand

    Semantic filters: symmetric-key encryption

    Topics: data encryption privacy access control symmetric-key encryption smart metering

    Methods: design artifact computational algorithm design science

  • Simultaneous multi-level RFID tag ownership & transfer in health care environments

    PDF

    2012 | Decision Support Systems | Citations: 0

    Authors: Zhou, Wei; Yoon, Eun Jung; Piramuthu, Selwyn

    Abstract: Authentication of Radio Frequency Identification (RFID) tags takes several forms ... Expand

    Semantic filters: symmetric-key encryption

    Topics: radio frequency identification logistics management electronic authentication supply chain management IT security threat

  • Anti-counterfeiting, key distribution, and key storage in an ambient world via physical unclonable functions

    PDF

    2009 | Information Systems Frontiers | Citations: 0

    Authors: Guajardo, Jorge; Škorić, Boris; Tuyls, Pim; Kumar, Sandeep S.; Bel, Thijs; Blom, Antoon H. M.; Schrijen, Geert-Jan

    Abstract: Virtually all applications which provide or require a security service need a se ... Expand

    Semantic filters: symmetric-key encryption

    Topics: computer hardware electronic authentication privacy radio frequency identification random-access memory

    Methods: computational algorithm design artifact descriptive statistic

  • Sharing and access right delegation for confidential documents: A practical solution

    PDF

    2006 | Information & Management | Citations: 0

    Authors: Yiu, S. M.; Yiu, S. W.; Lee, L. K.; Li, Eric K. Y.; Yip, Michael C. L.

    Abstract: This paper addresses a practical problem in document management systems for whic ... Expand

    Semantic filters: symmetric-key encryption

    Topics: data encryption database system public key encryption access control Java

    Methods: design artifact computational algorithm design science database modeling