3 results match your criteria: "Cyber Security Cooperative Research Centre (CSCRC)[Affiliation]"
Empir Softw Eng
November 2022
Centre for Research on Engineering Software Technologies, The University of Adelaide, Adelaide, SA 5005 Australia.
Unlabelled: An increasing number of mental health services are now offered through mobile health (mHealth) systems, such as in mobile applications (apps). Although there is an unprecedented growth in the adoption of mental health services, partly due to the COVID-19 pandemic, concerns about data privacy risks due to security breaches are also increasing. Whilst some studies have analyzed mHealth apps from different angles, including security, there is relatively little evidence for data privacy issues that may exist in mHealth apps used for mental health services, whose recipients can be particularly vulnerable.
View Article and Find Full Text PDFJ Netw Comput Appl
June 2022
Cyber Security Cooperative Research Centre (CSCRC), 6027, Perth, Australia.
The infection rate of COVID-19 and the rapid mutation ability of the virus has forced governments and health authorities to adopt lockdowns, increased testing, and contact tracing to reduce the virus's spread. Digital contact tracing has become a supplement to the traditional manual contact tracing process. However, although several digital contact tracing apps are proposed and deployed, these have not been widely adopted due to apprehensions surrounding privacy and security.
View Article and Find Full Text PDFSensors (Basel)
April 2021
Cyber Security Cooperative Research Centre (CSCRC), Perth 6027, Australia.
Internet of Vehicles (IoV) has the potential to enhance road-safety with environment sensing features provided by embedded devices and sensors. This benignant feature also raises privacy issues as vehicles announce their fine-grained whereabouts mainly for safety requirements, adversaries can leverage this to track and identify users. Various privacy-preserving schemes have been designed and evaluated, for example, mix-zone, encryption, group forming, and silent-period-based techniques.
View Article and Find Full Text PDF