2022 | Americas Conference on Information Systems | Citations: 0
Authors: Zhong, Chen; Kim, J. B. (Joo Baek); Liu, Hong
Abstract: Effective cybersecurity education is a critical domain in addressing the shorta ... Expand
Semantic filters: symmetric-key encryption
Topics: IT security IT career gamification intrinsic motivation digital signature
Methods: statistical hypothesis test longitudinal research structural equation modeling cross sectional survey cross sectional research
2020 | Decision Support Systems | Citations: 0
Authors: Doss, Robin; Trujillo-Rasua, Rolando; Piramuthu, Selwyn
Abstract: We develop a secure attribute-based search protocol for Radio Frequency Identifi ... Expand
Semantic filters: symmetric-key encryption
Topics: radio frequency identification privacy public key encryption electronic authentication data encryption
Methods: machine learning
2019 | HICSS | Citations: 0
Authors: Baccarini, Alessandro N; Hayajneh, Thaier
Abstract: The Internet of Things (IoT) is a network of interconnected low-power sensing de ... Expand
Semantic filters: symmetric-key encryption
Topics: data encryption internet of things mobile system cryptanalysis Advanced Encryption Standard
Methods: computational algorithm
2019 | HICSS | Citations: 0
Authors: Faber, Benedict; Michelet, Georg; Weidmann, Niklas; Mukkamala, Raghava Rao; Vatrapu, Ravi
Abstract: Recent scandals on the abuse of personal information from social media platforms ... Expand
Semantic filters: symmetric-key encryption
Topics: blockchain identity management General Data Protection Regulation legal context data encryption
Methods: archival research computational algorithm design artifact design guideline design science
2017 | HICSS | Citations: 0
Authors: Puthal, Deepak; Nepal, Surya; Ranjan, Rajiv; Nepal, Surya; Chen, Jinjun
Abstract: A large number of mission critical applications ranging from disaster management ... Expand
Semantic filters: symmetric-key encryption
Topics: big data electronic authentication data encryption stream processing Java
Methods: experiment simulation computational algorithm literature study
2012 | International Conference on Information Systems | Citations: 0
Authors: Strüker, Jens; Kerschbaum, Florian
Abstract: The introduction of so-called smart meters involves detailed consumption data. W ... Expand
Semantic filters: symmetric-key encryption
Topics: data encryption privacy access control symmetric-key encryption smart metering
Methods: design artifact computational algorithm design science
2012 | Decision Support Systems | Citations: 0
Authors: Zhou, Wei; Yoon, Eun Jung; Piramuthu, Selwyn
Abstract: Authentication of Radio Frequency Identification (RFID) tags takes several forms ... Expand
Semantic filters: symmetric-key encryption
Topics: radio frequency identification logistics management electronic authentication supply chain management IT security threat
2009 | Information Systems Frontiers | Citations: 0
Authors: Guajardo, Jorge; Škorić, Boris; Tuyls, Pim; Kumar, Sandeep S.; Bel, Thijs; Blom, Antoon H. M.; Schrijen, Geert-Jan
Abstract: Virtually all applications which provide or require a security service need a se ... Expand
Semantic filters: symmetric-key encryption
Topics: computer hardware electronic authentication privacy radio frequency identification random-access memory
Methods: computational algorithm design artifact descriptive statistic
2006 | Information & Management | Citations: 0
Authors: Yiu, S. M.; Yiu, S. W.; Lee, L. K.; Li, Eric K. Y.; Yip, Michael C. L.
Abstract: This paper addresses a practical problem in document management systems for whic ... Expand
Semantic filters: symmetric-key encryption
Topics: data encryption database system public key encryption access control Java
Methods: design artifact computational algorithm design science database modeling