Search
Now showing items 1311-1320 of 1638
General Data Format Security Extensions for Biomedical Signals
(2018)
Biosignals recorded using personal health devices and stored in General Data Format (GDF) are vulnerable when the data is transferred, processed and stored to the external servers. The aforementioned vulnerabilities influence ...
Towards Privacy by Design in Personal e-Health Systems
(SCITEPRESS - Science and Technology Publications, Lda, 2016)
Personal e-health systems are the next generation of e-health applications and their goal is to assist patientsin managing their disease and to help both patients and healthy people maintain behaviours that ...
A privacy-preserving protocol for finding the nearest doctor in an emergency
(2010-06)
In this work, we define the Nearest Doctor Problem (NDP) for finding the closest doctor in case of an emergency and present a secure multi-party computation for solving it. The solution is based on a privacy-preserving ...
Empowering Responsible Online Gambling by Real-time Persuasive Information Systems
(IEEE, 2018-05)
Online gambling, unlike other mediums of problem-atic and addictive behaviours, such as tobacco and alcohol, offers unprecedented opportunities for building information systems that are able to monitor and understand a ...
Blockchain-based Consents Management for Personal Data Processing in the IoT Ecosystem
(2018)
In the Internet of Things (IoT) ecosystem the volume of data generated by devices in the user’s environment is constantly increasing and becoming of particular value. In such an environment the average user is bound to ...
An Online Service for Topics and Trends Analysis in Medical Literature
(IFMBE Proceedings, 2018-05)
Topic modeling refers to a suite of probabilistic algorithms for extracting word patterns from a collection of documents aiming for data clustering and detection of research trends. We developed an online service that ...
ADvoCATE: A Consent Management Platform for Personal Data Processing in the IoT Using Blockchain Technology
(International Conference on Security for Information Technology and Communications, 2018)
The value of personal data generated and managed by smartdevices which comprise the Internet of Things (IoT) is unquestionable.The EU General Data Protection Regulation (GDPR) that has beenrecentlyput in force, sets the ...
Deriving the Political Affinity of Twitter Users from Their Followers
(IEEE, 2018)
In this work, we show that Twitter users can reveal valuable political information about particular Nodes of Interest (NOIs) they opt to follow. More precisely, we utilize an interesting graph projection method and a series ...
Computer Vision Meets Educational Robotics
(MDPI, 2021)
Educational robotics has gained a lot of attention in the past few years in K-12 education. Prior studies have shown enough shreds of evidence and highlight the benefits of educational robotics as being effective in providing ...
How much does a zero-permission Android app know about us?
(2019-11)
Android devices contain a vast amount of personal data of their owners. These data are stored on the device and are protected by the Android permission scheme. Android apps can obtain access to specific data items by ...