Search results

  • CSV Spreadsheet
  • RSS Feed
(1 - 12 of 12)
A framework for user-centric privacy management in smartphones regarding Bluetooth Low Energy beacons
BIO-INSPIRED CYBER SECURITY AND THREAT ANALYTICS
Clustering and Recommendation Techniques for Access Control Policy Management
Developing Privacy Enhancing Technology For DNA Data Sharing In Public Genealogy Platforms
Evaluating Co-Creation In Collaborative Drawing Using Creative Thinking Modes
Evaluating Risk Appeal Approaches Based on PMT Towards Making Secure Decisions
Exploring the Perceptions of Users-as-Beacons Systems: Developing and Deploying Real-Life Prototypes
SECURING MOBILE HYBRID APPLICATIONS THROUGH CONFIGURATIONS - FIRST LINE OF DEFENSE
SYSTEMATIC POLICY ANALYSIS AND MANAGEMENT
Towards Effective Third-Party Application Dialogs: Solutions for Improved Attention and Comprehension
User Centric Policy Management
User-centric secure cross-site interaction framework for online social networking services