Law et al., 2024 - Google Patents
Conviction: A subscription-based decentralized network for relationshipLaw et al., 2024
View PDF- Document ID
- 2251005392730093246
- Author
- Law H
- Gurung N
- Lee K
- Kwok Y
- et al.
- Publication year
- Publication venue
- 7th International Blockchain Olympiad (IBCOL 2024)
External Links
Snippet
The rise of online dating apps has revolutionized the way people connect, but it has also introduced significant challenges, including catfishing, fraudulent profiles, and privacy concerns. These issues undermine users' trust and create a less secure environment for …
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Jin | Artificial intelligence and consumer privacy | |
US8959584B2 (en) | Systems and methods for universal enhanced log-in, identity document verification and dedicated survey participation | |
Irshad et al. | Identity theft and social media | |
US20200145399A1 (en) | System and Method for Identity Management | |
US9398022B2 (en) | Systems and methods for universal enhanced log-in, identity document verification, and dedicated survey participation | |
CN102317903B (en) | Use social information that user conversation is authenticated | |
US8255452B2 (en) | Systems and methods for universal enhanced log-in, identity document verification, and dedicated survey participation | |
US8893241B2 (en) | Systems and methods for universal enhanced log-in, identity document verification and dedicated survey participation | |
US20190303929A1 (en) | Using out-of-band mobile device possession attestation to release verified user identity attributes during internet transactions | |
US20170201518A1 (en) | Method and system for real-time authentication of user access to a resource | |
Camenisch et al. | Digital Privacy: PRIME-Privacy and Identity Management for Europe | |
CN103827883A (en) | Method to control the access of personal data of a user | |
Prabhu et al. | A study of the challenges faced by the hotel sector with regards to cyber security | |
Holm | Social networking, the catalyst for identity thefts in the digital society | |
Law et al. | Conviction: A subscription-based decentralized network for relationship | |
Campbell et al. | Technology-mediated sex work: Fluidity, networking and regulation in the UK | |
Tran et al. | Security, privacy, and data-sharing trade-offs when moving to the united states: Insights from a qualitative study | |
Chik | The Lion, the Dragon and the Wardrobe Guarding the Doorway to Information and Communications Privacy on the Internet: A Comparative Case Study of Hong Kong and Singapore-Two Differing Asian Approaches | |
Agwanyanjaba | Enhanced Mobile Banking Security: Implementing Transaction Authorization Mechanism Via USSD Push. | |
Salami et al. | SIMP-REAUTH: a simple multilevel real user remote authentication scheme for mobile cloud computing | |
Priem et al. | The identity landscape | |
Bhagat et al. | Technology: Impact on the youth and society | |
Sultan | Influence of social media on Modern Day Political Culture and Policy Building | |
Sein | A Study on Cybercrimes Awareness of Internet Users in Yangon (Yadanar Sein, 2020) | |
Jordan | A Study of Population Groups More Apt to Become Victims of Digital Financial Fraud |