2019 5th International Conference on Web Research (ICWR) 2019
DOI: 10.1109/icwr.2019.8765254
|View full text |Cite
|
Sign up to set email alerts
|

Privacy Issues in Social Web of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 12 publications
(6 citation statements)
references
References 14 publications
0
6
0
Order By: Relevance
“…Famous websites like PayPal, Myspace, Orkut (Google's social media platform), amazon, and TweetDeck (an application in Twitter) had been affected by hackers in the past [42]. It is possible to strengthen the security of the environment by applying security mechanisms such as authentication protocols, built resilient and well-tested code, manipulating encryption technology, or by putting security level checks on APIs [8]. The focus of that study was to find the privacy issues find the lightweight privacy solution that can be implemented in a heterogeneous environment.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Famous websites like PayPal, Myspace, Orkut (Google's social media platform), amazon, and TweetDeck (an application in Twitter) had been affected by hackers in the past [42]. It is possible to strengthen the security of the environment by applying security mechanisms such as authentication protocols, built resilient and well-tested code, manipulating encryption technology, or by putting security level checks on APIs [8]. The focus of that study was to find the privacy issues find the lightweight privacy solution that can be implemented in a heterogeneous environment.…”
Section: Discussionmentioning
confidence: 99%
“…The integration of WoT with wireless sensor networks provides the capabilities to connect real-life physical objects with a unified system. While integrating, serious issues raised over the access of individual information related to smart things and individual privacy [8]. The authors proposed that it is possible to strengthen the security of the environment by applying security instruments such as authentication protocols, built resilient and well-tested code, manipulating encryption technology, and by doing security level checks upon APIs.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The information gained from 2G protection concerns have worked to shape stronger 3G network safety mechanisms. Main vulnerability problems in 2G networks have been addressed in 3G, like shorter key lengths and a fake attack by BS [46]. In addition, the security of 3G technologies and frameworks have been developed in such a manner that it is possible to expand them and improved them to counter novel challenges and gratify emerging service protection necessities.…”
Section: G Security and Risk Environmentmentioning
confidence: 99%
“…The difference between LA and Q-learning is that the former technique neglects the memory of Q-values, but updates the action possibility straight to find the learning result. LA is a learning scheme with a rigorous proof of convergence [22].…”
Section: Markov Decision Process (Mdp)mentioning
confidence: 99%