Sempreboni et al., 2020 - Google Patents
Privacy, security and trust in the internet of neuronsSempreboni et al., 2020
View PDF- Document ID
- 15574411473651660888
- Author
- Sempreboni D
- Viganò L
- Publication year
- Publication venue
- International Workshop on Socio-Technical Aspects in Security and Trust
External Links
Snippet
Abstract Arpanet, Internet, Internet of Services, Internet of Things, Internet of Skills. What next? We conjecture that in a few years from now, we will have the Internet of Neurons, in which humans will be able to connect bi-directionally to the net using only their brain. The …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce, e.g. shopping or e-commerce
- G06Q30/02—Marketing, e.g. market research and analysis, surveying, promotions, advertising, buyer profiling, customer management or rewards; Price estimation or determination
- G06Q30/0241—Advertisement
- G06Q30/0251—Targeted advertisement
- G06Q30/0269—Targeted advertisement based on user profile or attribute
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Ienca et al. | Hacking the brain: brain–computer interfacing technology and the ethics of neurosecurity | |
Shuwandy et al. | Sensor-based mHealth authentication for real-time remote healthcare monitoring system: A multilayer systematic review | |
Bonaci et al. | App stores for the brain: Privacy & security in Brain-Computer Interfaces | |
Kazansky et al. | “Bodies not templates”: Contesting dominant algorithmic imaginaries | |
Thorpe et al. | Pass-thoughts: authenticating with our minds | |
Samkari et al. | Protecting medical records against cybercrimes within Hajj period by 3-layer security | |
Hernández-Álvarez et al. | Privacy-preserving sensor-based continuous authentication and user profiling: a review | |
Sempreboni et al. | Privacy, security and trust in the internet of neurons | |
Bonaci et al. | Securing the exocortex: A twenty-first century cybernetics challenge | |
Letafati et al. | On the privacy and security for e-health services in the metaverse: An overview | |
Henrichsen | Breaking through the ambivalence: Journalistic responses to information security technologies | |
Xia et al. | Privacy-preserving brain–computer interfaces: A systematic review | |
Premi et al. | Data Privacy and Confidentiality in Healthcare Applications of IoT-Enabled Wireless Sensor Networks | |
Renieris | Beyond data: Reclaiming human rights at the dawn of the metaverse | |
Del Re et al. | Future wireless systems for human bond communications | |
Zhou et al. | A privacy-preserving logistic regression-based diagnosis scheme for digital healthcare | |
Dixit et al. | Human bond communication: the holy grail of holistic communication and immersive experience | |
Aksar et al. | Virtual manifestations of patriarchy: Digital experience of Pakistani women | |
Jones et al. | Privacy, safety, and security in extended reality: user experience challenges for neurodiverse users | |
Sharma et al. | E-learning platform security issues and their prevention techniques: A review | |
Pashentsev | The malicious use of deepfakes against psychological security and political stability | |
Naughton et al. | Augmented humanity: data, privacy and security | |
Müftüoğlu et al. | Privacy-preserving mechanisms with explainability in assistive AI technologies | |
Mahmood et al. | Improving security architecture of Internet of Medical Things: A systematic literature review | |
Fitzpatrick | Introduction: New technologies and social policy |