security and privacy
RFID Security and Privacy
15
Derivation of Constraints from Machine Learning Models and Applications to Security and Privacy
21
Security and privacy concerns about the RFID layer of EPC Gen2 networks
22
Towards a Context-Aware Security and Privacy as a Service in the Internet of Things
13
Enhancing information security and privacy by combining biometrics with cryptography
230
Policy-based Privacy and Security Management for Collaborative E-education Systems
7
User Perceptions of Privacy and Security on the Web
14
Security and privacy issues in cloud computing
4
Security and privacy in RFID systems
228
Security Protocols and Privacy Issues into 6LoWPAN Stack: A Synthesis
17
Dead reckoning : where we stand on privacy and security controls for the Internet of Things
218
Measures for assessing architectural speech security (privacy) of closed offices and meeting rooms
55
Guide for Assessment of the Architectural Speech Privacy and Speech Security of Closed Offices and Meeting Rooms
19
Security and privacy in online social networks
230
Security and privacy in automotive on-board networks
226
Cancelable biometrics for better security and privacy in biometric systems
16
Symbolic verification of privacy-type properties for security protocols with XOR
16
Symbolic verification of privacy-type properties for security protocols with XOR (extended version)
30
Practical and Privacy-Preserving TEE Migration
17
Information Security Theory and Practice
11