Tags
Language
Tags
April 2024
Su Mo Tu We Th Fr Sa
31 1 2 3 4 5 6
7 8 9 10 11 12 13
14 15 16 17 18 19 20
21 22 23 24 25 26 27
28 29 30 1 2 3 4
https://canv.ai/
The picture is generated by canv.ai

We are excited to announce that Canv.ai now features a built-in translator, allowing you to communicate in your native language. You can write prompts in your language, and they will be automatically translated into English, facilitating communication and the exchange of ideas!

We value freedom of speech and guarantee the absence of censorship on Canv.ai. At the same time, we hope and believe in the high moral standards of our users, which will help maintain a respectful and constructive atmosphere.


👉 Check for yourself!

No Trust, No Sale: The HOW TO on Building Comfort and Trust with Your Customers

Posted By: TiranaDok
No Trust, No Sale: The HOW TO on Building Comfort and Trust with Your Customers

No Trust, No Sale: The HOW TO on Building Comfort and Trust with Your Customers by Thomas Morin
English | July 5, 2023 | ISBN: N/A | ASIN: B0C7LSL9V3 | 192 pages | EPUB | 1.85 Mb

Privacy, Security and Trust within the Context of Pervasive Computing (Repost)

Posted By: AvaxGenius
Privacy, Security and Trust within the Context of Pervasive Computing (Repost)

Privacy, Security and Trust within the Context of Pervasive Computing by Philip Robinson, Harald Vogt, Waleed Wagealla
English | PDF | 2005 | 167 Pages | ISBN : 0387234616 | 9 MB

Privacy, Security and Trust within the Context of Pervasive Computing is an edited volume based on a post workshop at the second international conference on Pervasive Computing. The workshop was held April18-23, 2004, in Vienna, Austria.The goal of the workshop was not to focus on specific, even novel mechanisms, but rather on the interfaces between mechanisms in different technical and social problem spaces. An investigation of the interfaces between the notions of context, privacy, security, and trust will result in a deeper understanding of the "atomic" problems, leading to a more complete understanding of the social and technical issues in pervasive computing.

Touch the Wounds: On Suffering, Trust, and Transformation

Posted By: arundhati
Touch the Wounds: On Suffering, Trust, and Transformation

Tomáš Halík, "Touch the Wounds: On Suffering, Trust, and Transformation"
English | ISBN: 0268204896 | 2023 | 170 pages | EPUB | 964 KB

How Trust Works: The Science of How Relationships Are Built, Broken, and Repaired

Posted By: Free butterfly
How Trust Works: The Science of How Relationships Are Built, Broken, and Repaired

How Trust Works: The Science of How Relationships Are Built, Broken, and Repaired by Dr. Peter H. Kim
English | August 15, 2023 | ISBN: 1250838150 | 256 pages | PDF | 2.26 Mb

Security, Trust and Privacy Models, and Architectures in IoT Environments

Posted By: AvaxGenius
Security, Trust and Privacy Models, and Architectures in IoT Environments

Security, Trust and Privacy Models, and Architectures in IoT Environments by Lidia Fotia, Fabrizio Messina, Domenico Rosaci, Giuseppe M.L. Sarné
English | PDF,EPUB | 2023 | 186 Pages | ISBN : 3031219392 | 31 MB

This book is dedicated to the issues of security, trust and privacy models, and architectures in IoT environments. The authors aim to capture the latest research and contributions from academy, industry, and other stakeholders on new security models, architectures, protocols, and standards for ensuring security, privacy, and trustworthiness to IoT systems. The authors discuss the convergence of IoT, software agents, and edge computing to introduce social features into IoT systems, combining trustworthiness and reputation information collected by agents at the edge with security and privacy mechanisms. They also cover experimental and simulated campaigns that evaluate strategies to improve the security and privacy of the IoT world, and at the same time the ability to prevent and deter deceptive behaviors. The book is relevant for researchers, professionals, academics, and students.

Physically Unclonable Functions (PUFs): Applications, Models, and Future Directions

Posted By: AvaxGenius
Physically Unclonable Functions (PUFs): Applications, Models, and Future Directions

Physically Unclonable Functions (PUFs): Applications, Models, and Future Directions by Christian Wachsmann
English | PDF(True) | 2014 | 93 Pages | ISBN : 1627055096 | 2.51 MB

Today, embedded systems are used in many security-critical applications, from access control, electronic tickets, sensors, and smart devices (e.g., wearables) to automotive applications and critical infrastructures. These systems are increasingly used to produce and process both security-critical and privacy-sensitive data, which bear many security and privacy risks. Establishing trust in the underlying devices and making them resistant to software and hardware attacks is a fundamental requirement in many applications and a challenging, yet unsolved, task. Solutions solely based on software can never ensure their own integrity and trustworthiness while resource-constraints and economic factors often prevent the integration of sophisticated security hardware and cryptographic co-processors. In this context, Physically Unclonable Functions (PUFs) are an emerging and promising technology to establish trust in embedded systems with minimal hardware requirements.

Privacy for Location-based Services

Posted By: AvaxGenius
Privacy for Location-based Services

Privacy for Location-based Services by Gabriel Ghinita
English | PDF(True) | 2013 | 87 Pages | ISBN : 162705149X | 1.09 MB

Sharing of location data enables numerous exciting applications, such as location-based queries, location-based social recommendations, monitoring of traffic and air pollution levels, etc. Disclosing exact user locations raises serious privacy concerns, as locations may give away sensitive information about individuals' health status, alternative lifestyles, political and religious affiliations, etc. Preserving location privacy is an essential requirement towards the successful deployment of location-based applications. These lecture notes provide an overview of the state-of-the-art in location privacy protection. A diverse body of solutions is reviewed, including methods that use location generalization, cryptographic techniques or differential privacy. The most prominent results are discussed, and promising directions for future work are identified.

Automated Software Diversity

Posted By: AvaxGenius
Automated Software Diversity

Automated Software Diversity by Per Larsen
English | PDF(True) | 2015 | 90 Pages | ISBN : 162705734X | 1.38 MB

Whereas user-facing applications are often written in modern languages, the firmware, operating system, support libraries, and virtual machines that underpin just about any modern computer system are still written in low-level languages that value flexibility and performance over convenience and safety. Programming errors in low-level code are often exploitable and can, in the worst case, give adversaries unfettered access to the compromised host system.

Hardware Malware

Posted By: AvaxGenius
Hardware Malware

Hardware Malware by Christian Krieg
English | PDF(True) | 2013 | 117 Pages | ISBN : 1627052518 | 1.54 MB

In our digital world, integrated circuits are present in nearly every moment of our daily life. Even when using the coffee machine in the morning, or driving our car to work, we interact with integrated circuits. The increasing spread of information technology in virtually all areas of life in the industrialized world offers a broad range of attack vectors. So far, mainly software-based attacks have been considered and investigated, while hardware-based attacks have attracted comparatively little interest.

eTrust: Forming Relationships in the Online World

Posted By: step778
eTrust: Forming Relationships in the Online World

Karen S. Cook, Chris Snijders, Vincent Buskens, "eTrust: Forming Relationships in the Online World"
English | 2009 | pages: 334 | ISBN: 0871543117 | PDF | 8,5 mb

Trust, Privacy and Security in Digital Business

Posted By: AvaxGenius
Trust, Privacy and Security in Digital Business

Trust, Privacy and Security in Digital Business: 18th International Conference, TrustBus 2021, Virtual Event, September 27–30, 2021, Proceedings by Simone Fischer-Hübner
English | EPUB | 2021 | 175 Pages | ISBN : 3030865851 | 12.3 MB

This volume LNCS 12927 constitutes the papers of the 18th International Conference on Trust, Privacy and Security in Digital Business, TrustBus 2021, held in September 2021 as part of the DEXA 2021 conference. The event was held virtually due to COVID-19 pandemic. The 11 full papers presented were carefully reviewed and selected from 30 submissions regarding advancements in the state of the art and practice of trust and privacy in digital business. The papers are organized in topical sections: Trust Evaluation; Security Risks; Web Security; Data Protection and Privacy Controls; and Privacy and Users

Trust, Privacy and Security in Digital Business

Posted By: AvaxGenius
Trust, Privacy and Security in Digital Business

Trust, Privacy and Security in Digital Business: 18th International Conference, TrustBus 2021, Virtual Event, September 27–30, 2021, Proceedings by Simone Fischer-Hübner
English | PDF | 2021 | 175 Pages | ISBN : 3030865851 | 6.5 MB

This volume LNCS 12927 constitutes the papers of the 18th International Conference on Trust, Privacy and Security in Digital Business, TrustBus 2021, held in September 2021 as part of the DEXA 2021 conference. The event was held virtually due to COVID-19 pandemic. The 11 full papers presented were carefully reviewed and selected from 30 submissions regarding advancements in the state of the art and practice of trust and privacy in digital business. The papers are organized in topical sections: Trust Evaluation; Security Risks; Web Security; Data Protection and Privacy Controls; and Privacy and Users

Socio-Technical Aspects in Security and Trust

Posted By: AvaxGenius
Socio-Technical Aspects in Security and Trust

Socio-Technical Aspects in Security and Trust: 9th International Workshop, STAST 2019, Luxembourg City, Luxembourg, September 26, 2019, Revised Selected Papers by Thomas Groß
English | PDF | 2021 | 238 Pages | ISBN : 3030559572 | 13 MB

The volume LNCS 11739 constitutes the proceedings of the 9th International Workshop on Socio-Technical Aspects in Security, STAST 2019, held in Luxembourg, in September 2019.
The total of 9 full papers together with 1 short paper was carefully reviewed and selected from 28 submissions. The papers were organized in topical sections named as follows: Methods for Socio-Technical Systems focused on instruments, frameworks and re ections on research methodology and also System Security considered security analyses and attacks on security systems. Finally, Privacy Control incorporated works on privacy protection and control as well as human factors in relation to these topics.

Can You Trust Your Trust?: What You Need to Know about the Advantages and Disadvantages of Trusts and Trust Compliance Issues

Posted By: DZ123
Can You Trust Your Trust?: What You Need to Know about the Advantages and Disadvantages of Trusts and Trust Compliance Issues

Seymour Goldberg, "Can You Trust Your Trust?: What You Need to Know about the Advantages and Disadvantages of Trusts and Trust Compliance Issues"
English | 2015 | ISBN: 1627227091 | EPUB | pages: 183 | 0.2 mb

Discourses of Trust

Posted By: step778
Discourses of Trust

C. Candlin, Jonathan Crichton, "Discourses of Trust"
English | 2012 | pages: 344 | ISBN: 023030849X | PDF | 1,1 mb