Now showing items 1-4 of 4
Analyzing PeerFlow – A Bandwidth Estimation System for Untrustworthy Environments
Tor is the most popular low-latency anonymization network comprising over 7,000 nodes run by volunteers. To balance the user traffic load over the diverse resource capabilities of these nodes, Tor guides users to choose nodes in proportion to their available bandwidth. However, self-reported bandwidth values are not ...
App-generated digital identities extracted through Android permission-based data access - a survey of app privacy
Smartphone apps that run on Android devices can access many types of personal information. Such information can be used to identify, profile and track the device users when mapped into digital identity attributes. This article presents a model of identifiability through access to personal data protected by the Android ...
Do Privacy Concerns Prevent Employees’ Acceptance of Smart Wearables and Collaborative Robots?
During the digitization of workplaces, companies are increasingly using smart wearables as well as collaborate robots. This technological progress contributes to higher productivity and efficiency in manufacturing processes, as they assist employees in carrying out their work. This changes the way employees interact and ...
CryptoCAN – Ensuring Confidentiality in Controller Area Networks for Agriculture
The Controller Area Network (CAN) bus is widely used in existing machinery. Facing more and more vertical integration with more complex devices and integration into public communication networks, its nature as a broadcast-only system without security measures poses serious risks to confidentiality of transmitted data. ...