Marko Hölbl
YOU?
Author Swipe
View article: A Secure Way of Communication for Smart Grid Networks
A Secure Way of Communication for Smart Grid Networks Open
In 2021, Khan et al. suggested a scheme based on smart grid networks. They deployed the random oracle model to justify the security of their scheme formally. They also verified the security of the scheme using the AVISPA software tool. We …
View article: Security Enhanced CLS and CL-AS Scheme Without Pairings for VANETs
Security Enhanced CLS and CL-AS Scheme Without Pairings for VANETs Open
While vehicle ad-hoc networks (VANETs) have many advantages, they also present privacy and security concerns. Certificate management issues have been seen in traditional public key infrastructure-based privacy-preserving authentication sch…
View article: Browser Fingerprinting: Overview and Open Challenges
Browser Fingerprinting: Overview and Open Challenges Open
The central concept of browser fingerprinting is the collection of device-specific information for identification or security purposes. This chapter provides an overview of the research conducted in the field of browser fingerprinting and …
View article: eIDAS Interoperability and Cross-Border Compliance Issues
eIDAS Interoperability and Cross-Border Compliance Issues Open
The eIDAS Regulation provides a common foundation for secure electronic interaction between citizens, businesses, and public authorities. We investigated and identified interoperability and cross-border compliance issues in this paper. We …
View article: Security Perception of IoT Devices in Smart Homes
Security Perception of IoT Devices in Smart Homes Open
IoT devices are used frequently in smart homes. To better understand how users perceive the security of IoT devices in their smart homes, a model was developed and tested with multiple linear regression. A total of 306 participants partici…
View article: Security Perception of IoT Devices in Smart Homes
Security Perception of IoT Devices in Smart Homes Open
IoT devices are used frequently in smart homes. To better understand how users perceive the security of IoT devices in their smart homes, a model was developed and tested with multiple linear regression. A total of 306 participants partici…
View article: Models of Privacy and Disclosure on Social Networking Sites: A Systematic Literature Review
Models of Privacy and Disclosure on Social Networking Sites: A Systematic Literature Review Open
Social networking sites (SNSs) are used widely, raising new issues in terms of privacy and disclosure. Although users are often concerned about their privacy, they often publish information on social networking sites willingly. Due to the …
View article: Communication Challenges in Inclusive Education Faced by Deaf and Non-deaf People
Communication Challenges in Inclusive Education Faced by Deaf and Non-deaf People Open
This is a consolidated report on the work done in Intellectual Output One: Communication Challenges for the Advancing Inclusive Education Through International Sign - InSign project. This report combines and summarises the results obtained…
View article: Data Protection Heterogeneity in the European Union
Data Protection Heterogeneity in the European Union Open
In light of digitalisation, we are witnessing an increased volume of collected data and data generation and exchange acceleration. Therefore, the European Union (EU) has introduced the General Data Protection Regulation (GDPR) as a new fra…
View article: Cultural Diversity in Database Teaching
Cultural Diversity in Database Teaching Open
Despite a different understanding of the world, we are living in a global world in which we must cope not only with the communication in our own language and culture, but also with global communication in a common language, the so-called l…
View article: An Example of a Cybersecurity Education Model
An Example of a Cybersecurity Education Model Open
IT technology is a vital part of our everyday life and society. Additionally, as it is present in strategic domains like the military, healthcare or critical infrastructure, the aspect of protection, i.e. cybersecurity is of utmost importa…
View article: A Model of Perception of Privacy, Trust, and Self-Disclosure on Online Social Networks
A Model of Perception of Privacy, Trust, and Self-Disclosure on Online Social Networks Open
Online Social Networks are used widely, raising new issues in terms of privacy, trust, and self-disclosure. For a better understanding of these issues for Facebook users, a model was built that includes privacy value, privacy risk, trust, …
View article: A Systematic Review of the Use of Blockchain in Healthcare
A Systematic Review of the Use of Blockchain in Healthcare Open
Blockchain technology enables a decentralized and distributed environment with no need for a central authority. Transactions are simultaneously secure and trustworthy due to the use of cryptographic principles. In recent years, blockchain …
View article: A Systematic Review of the Use of Blockchain in Healthcare
A Systematic Review of the Use of Blockchain in Healthcare Open
Blockchain technology enables a decentralized and distributed environment with no need for a central authority. Transactions are simultaneously secure and trustworthy due to the use of cryptographic principles. In recent years, blockchain …
View article: EduCTX: A Blockchain-Based Higher Education Credit Platform
EduCTX: A Blockchain-Based Higher Education Credit Platform Open
Blockchain technology enables the creation of a decentralized environment where transactions and data are not under the control of any third party organization. Any transaction ever completed is recorded in a public ledger in a verifiable …