Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences

2020

Authentication

Articles 1 - 2 of 2

Full-Text Articles in Physical Sciences and Mathematics

Secure Authentication And Privacy-Preserving Techniques In Vehicular Ad-Hoc Networks (Vanets), Dakshnamoorthy Manivannan, Shafika Showkat Moni, Sherali Zeadally Oct 2020

Secure Authentication And Privacy-Preserving Techniques In Vehicular Ad-Hoc Networks (Vanets), Dakshnamoorthy Manivannan, Shafika Showkat Moni, Sherali Zeadally

Computer Science Faculty Publications

In the last decade, there has been growing interest in Vehicular Ad Hoc NETworks (VANETs). Today car manufacturers have already started to equip vehicles with sophisticated sensors that can provide many assistive features such as front collision avoidance, automatic lane tracking, partial autonomous driving, suggestive lane changing, and so on. Such technological advancements are enabling the adoption of VANETs not only to provide safer and more comfortable driving experience but also provide many other useful services to the driver as well as passengers of a vehicle. However, privacy, authentication and secure message dissemination are some of the main issues that …


Digital Age Of Consent And Age Verification: Can They Protect Children?, Liliana Pasquale, Paola Zippo, Cliona Curley, Brian O'Neill, Marina Mongiello Jan 2020

Digital Age Of Consent And Age Verification: Can They Protect Children?, Liliana Pasquale, Paola Zippo, Cliona Curley, Brian O'Neill, Marina Mongiello

Articles

Children are increasingly accessing social media content through mobile devices. Existing data protection regulations have focused on defining the digital age of consent, in order to limit collection of children’s personal data by organizations. However, children can easily bypass the mechanisms adopted by apps to verify their age, and thereby be exposed to privacy and safety threats. We conducted a study to identify how the top 10 social and communication apps among underage users apply age limits in their Terms of Use. We also assess the robustness of the mechanisms these apps put in place to verify the age of …