5 results
Search Results
Now showing 1 - 5 of 5
Conference Object Threshold Structure-Preserving Signatures With Randomizable Key(Science and Technology Publications, Lda, 2025) Ağırtaş, A.R.; Çelik, E.; Kocaman, S.; Sulak, F.; Yayla, OğuzDigital signatures confirm message integrity and signer identity, but linking public keys to identities can cause privacy concerns in anonymized settings. Signatures with randomizable keys can break this link, preserving verifiability without revealing the signer. While effective for privacy, complex cryptographic systems need to be modular structured for efficient implementation. Threshold structure-preserving signatures enable modular, privacy-friendly protocols. This work combines randomizable keys with threshold structure-preserving signatures to create a valid, modular, and unlinkable foundation for privacy-preserving applications. © 2025 by Paper published under CC license (CC BY-NC-ND 4.0).Review Web Privacy: a Commercial, Social and Technological Perspective(2003) Mishra,A.People all over the world are increasingly concerned about the privacy issues surrounding the personal information collected by the private organizations, governments and employers. Privacy relates to issues surrounding collection, secure transmission, storage, authorized access, usage and disclosure of personal information. This information is used for the commercial gain by many organizations. Individual privacy concerns significantly affects consumer willingness to engage in electronic commerce over the internet. The increased use of the internet and web for everyday activities is bringing new threats to personal privacy. This paper assessed various issues related to individual privacy on the web, growing concerns among the web users, technologies employed for collecting and protecting information on the web, privacy-enhancing technologies and the legal provisions to curb the web privacy.Article Citation - WoS: 11Citation - Scopus: 24The Effect of Social Media User Behaviors on Security and Privacy Threats(Ieee-inst Electrical Electronics Engineers inc, 2022) Cengiz, Aslihan Banu; Kalem, Guler; Boluk, Pinar SarisarayThe number of online social network (OSN) users is increasing daily and attacks and threats against over the time spent on online networks has been increasing equally. Attacks against OSN users exploit not only system vulnerabilities but also user-induced vulnerabilities, which naturally affect the hacker's attack strategy as well. This study is designed to investigate the effect of social media user behaviors on their vulnerability level in terms of security and privacy. The study was conducted survey methods, which was applied to social media users in two countries - Turkey and Iraq. This study documents and analyzes the behaviors of 700 OSN users in two countries. This study examines the behaviors of social media users from two nationalities, investigating whether there is a relationship between social media users' behaviors and security and privacy threats. Research findings demonstrate that there is a significant relationship between OSN users' behaviors and their attitudes towards security and privacy. Additionally, Turkish social media users pay more attention to their behaviors in terms of privacy and security awareness than Iraq users.Article Citation - WoS: 10Citation - Scopus: 15The Effects of Workstation Partition Heights on Employees' Perceptions in Open-Plan Of?ces(Emerald Group Publishing Ltd, 2019) Yildirim, Kemal; Gunes, Elif; Yilmaz, Gulcan PervanPurpose The purpose of this paper is to determine the effects of environmental factors in open-plan offices with the same characteristics but with different workstation partition heights (1.10, 1.40 and 1.65 m) on perceptual evaluations of office employees. Design/methodology/approach In this research, the effects of environmental factors on employees' perceptual evaluations in open-plan offices at the Golbasi Region of Ankara were measured with a detailed questionnaire. The research data were obtained from 81 employees who agreed to fill out the questionnaire and who use open-plan offices. Findings It was found that the office environments with 1.65 m workstation partition heights were more favorably assessed for each of the items of planning and of privacy that form the dependent variables compared to the office environments with 1.10 and 1.40 m partition heights. On the other hand, the office environments with the 1.10 and 1.40 m partition heights were more favorable for lighting items than the 1.65 m partition height office environments. In addition, young employees had a more positive tendency toward the perceptions of environmental factors, including different workstation partition heights in open-plan offices, compared to older employees. Originality/value The significant contribution of this research is that it provides valid data and makes a valuable contribution to the body of knowledge in open-plan office design.Article Citation - WoS: 4Citation - Scopus: 4Privacy Protection Via Joint Real and Reactive Load Shaping in Smart Grids(Elsevier, 2022) Kement, Cihan Emre; Ilic, Marija; Gultekin, Hakan; Cicek, Cihan Tugrul; Tavli, BulentFrequent metering of electricity consumption is crucial for demand-side management in smart grids. However, metered data can be processed fairly easily by employing well-established nonintrusive appliance load monitoring techniques to infer appliance usage, which reveals information about consumers' private lives. Existing load shaping techniques for privacy primarily focus only on altering metered real power, whereas smart meters collect reactive power consumption data as well for various purposes. This study addresses consumer privacy preservation via load shaping in a demand response scheme, considering both real and reactive power. We build a multi-objective optimization framework that enables us to characterize the interplay between privacy maximization, user cost minimization, and user discomfort minimization objectives. Our results reveal that minimizing information leakage due to a single component, e.g., real power, would suffer from overlooking information leakage due to the other component, e.g., reactive power, causing sub-optimal decisions. In fact, joint shaping of real and reactive power components results in the best possible privacy preservation performance, which leads to more than a twofold increase in privacy in terms of mutual information. (c) 2022 Elsevier Ltd. All rights reserved.

