Search Results

Results (36)

Search Parameters:

Keyword: Privacy
Order results
Results per page
Open AccessArticle
11 Pages, 2,283 KB Download PDF

A Survey and an IoT Cybersecurity Recommendation for Public and Private Hospitals in Ecuador

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 3, Page # 518–528, 2020; DOI: 10.25046/aj050364
Abstract:

It was analyzed the reference information on Cybersecurity architectures, models, standards, evaluations, mechanisms, and procedures applied to IoT domains, and public and private health area. The problem is the lack of proposals for IoT Cybersecurity in public and private hospitals to minimize random failures, ensure the privacy of personal data of patients, avoid the paralysis…

Read More
(This article belongs to Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
5 Pages, 212 KB Download PDF

Digital Sovereignty Between “Accountability” and the Value of Personal Data

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 3, Page # 270–274, 2020; DOI: 10.25046/aj050335
Abstract:

In the last year, especially in Europe, the expression “digital sovereignty” has been used very frequently to describe, above all, the primacy of a State. Indeed, the “digital sovereignty” is a complex concept, which entails cross-reference with several sectors and contexts. We believe that the concept of “digital sovereignty” can be two sides of a…

Read More
(This article belongs to Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
7 Pages, 814 KB Download PDF

A Harmonized European Drone Market? – New EU Rules on Unmanned Aircraft Systems

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 3, Page # 93–99, 2020; DOI: 10.25046/aj050312
Abstract:

The European drone market has been showing steady growth year after year. New EU drone rules will come into force as of July 1st, 2020, with the European Union setting itself the target to replace national rules with a common regulation with the ultimate goal of creating a harmonized European drone market. This study will…

Read More
(This article belongs to the SP8 (Special Issue on Multidisciplinary Sciences and Engineering 2019-20) & Section Aerospace Engineering (EAR))
Open AccessArticle
16 Pages, 1,198 KB Download PDF

Trust and Reputation Mechanisms in Vehicular Ad-Hoc Networks: A Systematic Review

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 1, Page # 387–402, 2020; DOI: 10.25046/aj050150
Abstract:

An emerging trend has been observed in the Trust and Reputation (T & R) systems in field of decision-making support for a majority of the provisions propagated by the Internet. It is the extreme importance that peers (users) are able to trust each other and rely on them for file sharing and for services. This…

Read More
(This article belongs to Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
13 Pages, 1,118 KB Download PDF

A Practical PIR-based Scheme for Discovering Nearby Places for Smartphone Applications

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 1, Page # 27–39, 2019; DOI: 10.25046/aj040104
Abstract:

We present a privacy-preserving approach for discovering nearby places of interest to Alice. In this approach, the proposed protocol allows Alice to learn whether there is any place that she is looking for near her. However, the location-based service (LBS) that tries to help Alice to find nearby places does not learn Alice’s location. Alice…

Read More
(This article belongs to the SP6 (Special Issue on Recent Advances in Engineering Systems 2018-19) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
8 Pages, 730 KB Download PDF

Actual Use and Continuous Use of Retail Mobile App: A Model Comparison Perspective

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 6, Page # 151–158, 2018; DOI: 10.25046/aj030619
Abstract:

A mobile retail app is a growing innovation in a retailing setting and there is an argument on the prominent status of a mobile application in contrast with a mobile website and web applications. The study used quantitative data to run multiple regression analysis with keen attention to linear regression assumption and compare four models…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
7 Pages, 276 KB Download PDF

The Internet of Things ecosystem: the blockchain and data protection issues

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 2, Page # 1–7, 2018; DOI: 10.25046/aj030201
Abstract:

The IoT is innovative and important phenomenon prone to several services and applications such as the blockchain which an emerging phenomenon. We can describe the blockchain as blockchain as a service because of the opportunity to use several applications based on this technology. We, indeed, should take into account the legal issues related to the…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
7 Pages, 694 KB Download PDF

A Survey of Security Challenges in Internet of Things

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 1, Page # 274–280, 2018; DOI: 10.25046/aj030133
Abstract:

Internet of things (IoT) is an innovative technology subject to all kind of imaginary and science fictional solutions. Dreams and speculations are still possible about it. A technology combining real life objects and virtual life (Internet) is indeed a fertile pitch of fantasy and original ideas. However, IoT has in practice to face several challenges…

Read More
(This article belongs to Section Telecommunications (TEL))
Open AccessArticle
9 Pages, 882 KB Download PDF

Review on security issues in RFID systems

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 6, Page # 194–202, 2017; DOI: 10.25046/aj020624
Abstract:

Radio frequency Identification (RFID) is currently considered as one of the most used technologies for an automatic identification of objects or people. Based on a combination of tags and readers, RFID technology has widely been applied in various areas including supply chain, production and traffic control systems. However, despite of its numerous advantages, the technology…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
7 Pages, 720 KB Download PDF

IoT: Their Conveniences, Security Challenges and Possible Solutions

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 1211–1217, 2017; DOI: 10.25046/aj0203153
Abstract:

The build-in internet-controlled functions of smart devices such as smart phone, smart television, home healthcare gadget, etc., have made them quite attractive to many segments of consumers. In recent years mankind has witnessed an upsurge usage of such devices for numerous purposes. In this paper, the author is going to show how previously forecasted security…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
6 Pages, 734 KB Download PDF

Strong Authentication Protocol based on Java Crypto Chip as a Secure Element

Advances in Science, Technology and Engineering Systems Journal, Volume 1, Issue 5, Page # 21–26, 2016; DOI: 10.25046/aj010505
Abstract:

Smart electronic devices and gadgets and their applications are becoming more and more popular. Most of those devices and their applications handle personal, financial, medical and other sensitive data that require security and privacy protection. In this paper we describe one aspect of such protection – user authentication protocol based on the use of X.509…

Read More
(This article belongs to the Special issue on Recent Advances in Electrical and Electronics Engineering 2016 & Section Cybernetics in Computer Science (CCY))

Journal Menu

Journal Browser


Special Issues

Special Issue on Digital Frontiers of Entrepreneurship: Integrating AI, Gender Equity, and Sustainable Futures
Guest Editors: Dr. Muhammad Nawaz Tunio, Dr. Aamir Rashid, Dr. Imamuddin Khoso
Deadline: 30 May 2026

Special Issue on Indigenous Knowledge Systems of the Tribal Communities of the Asia Pacific
Guest Editors: Dr. Anurag Hazarika
Deadline: 31 October 2026

Special Issue on Sustainable Technologies for a Resilient Future
Guest Editors: Dr. Debasis Mitra, Dr. Sourav Chattaraj, Dr. Addisu Assefa
Deadline: 30 April 2026