|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 11410 occurrences of 3224 keywords
|
|
|
Results
Found 63337 publication records. Showing 63336 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
45 | Palanivel A. Kodeswaran, Evelyne Viegas |
Applying differential privacy to search queries in a policy based interactive framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIKM-PAVLAD ![In: Proceeding of the ACM First International Workshop on Privacy and Anonymity for Very Large Databases, CIKM-PAVLAD 2009, Hong Kong, China, November 6, 2009, pp. 25-32, 2009, ACM. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
privacy, semantics, policy |
45 | Marco Casassa Mont, Robert Thyne |
Privacy policy enforcement in enterprises with identity management solutions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006, pp. 25, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
privacy, access control, identity management, policy enforcement |
45 | Haimonti Dutta, Hillol Kargupta, Souptik Datta, Krishnamoorthy Sivakumar |
Analysis of privacy preserving random perturbation techniques: further explorations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WPES ![In: Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society, WPES 2003, Washington, DC, USA, October 30, 2003, pp. 31-38, 2003, ACM, 1-58113-776-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
security, privacy, random-perturbation |
44 | Lujun Fang, Kristen LeFevre |
Privacy wizards for social networking sites. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW ![In: Proceedings of the 19th International Conference on World Wide Web, WWW 2010, Raleigh, North Carolina, USA, April 26-30, 2010, pp. 351-360, 2010, ACM, 978-1-60558-799-8. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
social network privacy, usability, active learning |
44 | Vibhor Rastogi, Michael Hay, Gerome Miklau, Dan Suciu |
Relationship privacy: output perturbation for queries with joins. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PODS ![In: Proceedings of the Twenty-Eigth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, PODS 2009, June 19 - July 1, 2009, Providence, Rhode Island, USA, pp. 107-116, 2009, ACM, 978-1-60558-553-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
output perturbation, social networks, sensitivity, privacy preserving data mining, join queries, private data analysis |
44 | Jafar Haadi Jafarian, Ali Noorollahi Ravari, Morteza Amini, Rasool Jalili |
Protecting Location Privacy through a Graph-Based Location Representation and a Robust Obfuscation Technique. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2008, 11th International Conference, Seoul, Korea, December 3-5, 2008, Revised Selected Papers, pp. 116-133, 2008, Springer, 978-3-642-00729-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Obfuscation Techniques, Reliability, Distributed Architecture, Location Privacy, Middleware Architecture |
44 | Abraham Esquivel, Pablo A. Haya, Manuel García-Herranz, Xavier Alamán |
Managing Pervasive Environment Privacy Using the "fair trade" Metaphor. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OTM Workshops (2) ![In: On the Move to Meaningful Internet Systems 2007: OTM 2007 Workshops, OTM Confederated International Workshops and Posters, AWeSOMe, CAMS, OTM Academy Doctoral Consortium, MONET, OnToContent, ORM, PerSys, PPN, RDDS, SSWS, and SWWS 2007, Vilamoura, Portugal, November 25-30, 2007, Proceedings, Part II, pp. 804-813, 2007, Springer, 978-3-540-76889-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
”fair-trade”, privacy, pervasive environments |
44 | Zhen Xiao, Xiaofeng Meng 0001, Jianliang Xu |
Quality Aware Privacy Protection for Location-Based Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DASFAA ![In: Advances in Databases: Concepts, Systems and Applications, 12th International Conference on Database Systems for Advanced Applications, DASFAA 2007, Bangkok, Thailand, April 9-12, 2007, Proceedings, pp. 434-446, 2007, Springer, 978-3-540-71702-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
QoS, Privacy, Location-based Services |
44 | Xiaoyi Yu, Noboru Babaguchi |
Privacy Preserving: Hiding a Face in a Face. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACCV (2) ![In: Computer Vision - ACCV 2007, 8th Asian Conference on Computer Vision, Tokyo, Japan, November 18-22, 2007, Proceedings, Part II, pp. 651-661, 2007, Springer, 978-3-540-76389-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Data Hiding, Privacy Preserving, Active Appearance Model |
44 | Hillol Kargupta, Souptik Datta, Qi Wang, Krishnamoorthy Sivakumar |
Random-data perturbation techniques and privacy-preserving data mining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Knowl. Inf. Syst. ![In: Knowl. Inf. Syst. 7(4), pp. 387-414, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Security, Data mining, Privacy, Random perturbation |
44 | Annie I. Antón, Julia Brande Earp |
A requirements taxonomy for reducing Web site privacy vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Requir. Eng. ![In: Requir. Eng. 9(3), pp. 169-185, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Security requirements, Privacy requirements |
44 | Michael Maaser, Steffen Ortmann, Peter Langendörfer |
The Privacy Advocate: Assertion of Privacy by Personalised Contracts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WEBIST (Selected Papers) ![In: Web Information Systems and Technologies, Third International Conference, WEBIST 2007, Barcelona, Spain, March 3-6, 2007, Revised Selected Papers, pp. 85-97, 2007, Springer, 978-3-540-68257-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
privacy contract, Privacy, mobile devices, negotiation, personalisation, user preferences, P3P |
44 | George Yee |
A privacy-preserving UBICOMP architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006, pp. 27, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
ubiquitous computing, architecture, privacy protection, privacy policy, UBICOMP |
44 | Rinku Dewri, Indrajit Ray, Indrakshi Ray, L. Darrell Whitley |
On the comparison of microdata disclosure control algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EDBT ![In: EDBT 2009, 12th International Conference on Extending Database Technology, Saint Petersburg, Russia, March 24-26, 2009, Proceedings, pp. 240-251, 2009, ACM, 978-1-60558-422-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
anonymization bias, performance evaluation, data privacy |
44 | Ali Inan, Murat Kantarcioglu, Gabriel Ghinita, Elisa Bertino |
Private record matching using differential privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EDBT ![In: EDBT 2010, 13th International Conference on Extending Database Technology, Lausanne, Switzerland, March 22-26, 2010, Proceedings, pp. 123-134, 2010, ACM, 978-1-60558-945-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
security, privacy, differential privacy, record matching |
44 | Victor Muntés-Mulero, Jordi Nin |
Privacy and anonymization for very large datasets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIKM ![In: Proceedings of the 18th ACM Conference on Information and Knowledge Management, CIKM 2009, Hong Kong, China, November 2-6, 2009, pp. 2117-2118, 2009, ACM, 978-1-60558-512-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
efficient privacy-enhancing technologies, efficient statistical disclosure control, privacy preserving data mining for large data sets |
44 | Jaakko T. Lehikoinen, Juha Lehikoinen, Pertti Huuskonen |
Understanding privacy regulation in ubicomp interactions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Pers. Ubiquitous Comput. ![In: Pers. Ubiquitous Comput. 12(8), pp. 543-553, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Privacy regulation, Ubiquitous computing, Personal privacy |
44 | George Yee |
Visualization for privacy compliance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VizSEC ![In: 3rd International Workshop on Visualization for Computer Security, VizSEC 2006, Alexandria, VA, USA, November 3, 2006, pp. 117-122, 2006, ACM, 1-59593-549-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
privacy legislation, visualization, privacy, compliance, e-services |
44 | Jianping Fan 0001, Hangzai Luo, Mohand-Said Hacid, Elisa Bertino |
A novel approach for privacy-preserving video sharing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIKM ![In: Proceedings of the 2005 ACM CIKM International Conference on Information and Knowledge Management, Bremen, Germany, October 31 - November 5, 2005, pp. 609-616, 2005, ACM, 1-59593-140-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
privacy-preserving video sharing, video content privacy, statistical inferences, unlabeled samples |
44 | Stephen E. Levy, Carl Gutwin |
Improving understanding of website privacy policies with fine-grained policy anchors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW ![In: Proceedings of the 14th international conference on World Wide Web, WWW 2005, Chiba, Japan, May 10-14, 2005, pp. 480-488, 2005, ACM, 1-59593-046-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
APPEL, conformance conflicts, e-commerce, privacy policies, P3P, user agents, privacy preferences |
43 | Christian S. Jensen, Hua Lu 0001, Man Lung Yiu |
Location Privacy Techniques in Client-Server Architectures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy in Location-Based Applications ![In: Privacy in Location-Based Applications, Research Issues and Emerging Trends [This book was partially born out of the First International Workshop on Privacy in Location-Based Applications (PiLBA 2008) held in Malaga, Spain, in October 2008, in conjunction with the 13th European Symposium on Research in Computer Security]., pp. 31-58, 2009, Springer, 978-3-642-03510-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
43 | Bob Askwith, Madjid Merabti, Qi Shi 0001, K. Whiteley |
Achieving User Privacy in Mobile Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 13th Annual Computer Security Applications Conference (ACSAC 1997), 8-12 December 1997, San Diego, CA, USA, pp. 108-, 1997, IEEE Computer Society, 0-8186-8274-4. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
third generation mobile networks, identification privacy, untrusted party, digital mixes, token based scheme, authorised third parties, billing requirements, coin like tokens, authentication, anonymity, cellular radio, user privacy, privacy requirements |
42 | Florian Dötzer |
Privacy Issues in Vehicular Ad Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy Enhancing Technologies ![In: Privacy Enhancing Technologies, 5th International Workshop, PET 2005, Cavtat, Croatia, May 30-June 1, 2005, Revised Selected Papers, pp. 197-209, 2005, Springer, 3-540-34745-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
42 | Elisa Bertino, Elena Ferrari, Anna Cinzia Squicciarini |
Privacy-Preserving Trust Negotiations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy Enhancing Technologies ![In: Privacy Enhancing Technologies, 4th International Workshop, PET 2004, Toronto, Canada, May 26-28, 2004, Revised Selected Papers, pp. 283-301, 2004, Springer, 3-540-26203-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
42 | Alfred Kobsa, Maximilian Teltzrow |
Contextualized Communication of Privacy Practices and Personalization Benefits: Impacts on Users' Data Sharing and Purchase Behavior. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy Enhancing Technologies ![In: Privacy Enhancing Technologies, 4th International Workshop, PET 2004, Toronto, Canada, May 26-28, 2004, Revised Selected Papers, pp. 329-343, 2004, Springer, 3-540-26203-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
42 | Jiejun Kong, Shirshanka Das, Edward Tsai, Mario Gerla |
ESCORT: a decentralized and localized access control system for mobile wireless access to secured domains. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Workshop on Wireless Security ![In: Proceedings of the 2003 ACM Workshop on Wireless Security, San Diego, CA, USA, September 19, 2003, pp. 51-60, 2003, ACM, 1-58113-769-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
decentralized access control, identity privacy, mobile privacy, location privacy, wireless security |
42 | Bhavani Thuraisingham |
Data Mining, National Security, Privacy and Civil Liberties. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGKDD Explor. ![In: SIGKDD Explor. 4(2), pp. 1-5, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
counter-terrorism, privacy constraints, privacy problem, privacy sensitive data mining, security constraints, data mining, privacy, World Wide Web, national security, inference problem, civil liberties |
42 | Ed Brown, Tracy Ann Kosa |
Incorporating Privacy Outcomes: Teaching an Old Dog New Tricks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Sixth Annual Conference on Privacy, Security and Trust, PST 2008, October 1-3, 2008, Fredericton, New Brunswick, Canada, pp. 232-239, 2008, IEEE Computer Society, 978-0-7695-3390-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
42 | Christos Kalloniatis, Evangelia Kavakli, Stefanos Gritzalis |
Using Privacy Process Patterns for Incorporating Privacy Requirements into the System Design Process. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Second International Conference on Availability, Reliability and Security, ARES 2007, The International Dependability Conference - Bridging Theory and Practice, April 10-13 2007, Vienna, Austria, pp. 1009-1017, 2007, IEEE Computer Society, 0-7695-2775-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
42 | Keon-Myung Lee, Jee-Hyong Lee 0001, Myung-Geun Chun |
Incorporating Privacy Policy into an Anonymity-Based Privacy-Preserving ID-Based Service Platform. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES (1) ![In: Knowledge-Based Intelligent Information and Engineering Systems, 9th International Conference, KES 2005, Melbourne, Australia, September 14-16, 2005, Proceedings, Part I, pp. 1028-1035, 2005, Springer, 3-540-28894-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
42 | George Yee |
Using Privacy Policies to Protect Privacy in UBICOMP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA ![In: 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 28-30 March 2005, Taipei, Taiwan, pp. 633-638, 2005, IEEE Computer Society, 0-7695-2249-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
42 | Annie I. Antón, Julia Brande Earp, Angela Reese |
Analyzing Website Privacy Requirements Using a Privacy Goal Taxonomy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RE ![In: 10th Anniversary IEEE Joint International Conference on Requirements Engineering (RE 2002), 9-13 September 2002, Essen, Germany, pp. 23-31, 2002, IEEE Computer Society, 0-7695-1465-0. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
42 | Balachander Krishnamurthy, Delfina Malandrino, Craig E. Wills |
Measuring privacy loss and the impact of privacy protection in web browsing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOUPS ![In: Proceedings of the 3rd Symposium on Usable Privacy and Security, SOUPS 2007, Pittsburgh, Pennsylvania, USA, July 18-20, 2007, pp. 52-63, 2007, ACM, 978-1-59593-801-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
privacy, web |
41 | Heng Xu, John W. Bagby, Terence Ryan Melonas |
Regulating Privacy in Wireless Advertising Messaging: FIPP Compliance by Policy vs. by Design. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy Enhancing Technologies ![In: Privacy Enhancing Technologies, 9th International Symposium, PETS 2009, Seattle, WA, USA, August 5-7, 2009. Proceedings, pp. 19-36, 2009, Springer, 978-3-642-03167-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Fair Information Practice Principles (FIPP), industry self-regulation, wireless advertising messaging (WAM), architecture design, privacy enhancing technologies (PETs), government regulation |
41 | Ramprasad Ravichandran, Michael Benisch, Patrick Gage Kelley, Norman M. Sadeh |
Capturing Social Networking Privacy Preferences: Can Default Policies Help Alleviate Tradeoffs between Expressiveness and User Burden? ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy Enhancing Technologies ![In: Privacy Enhancing Technologies, 9th International Symposium, PETS 2009, Seattle, WA, USA, August 5-7, 2009. Proceedings, pp. 1-18, 2009, Springer, 978-3-642-03167-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Mining default policies, Privacy, User modeling |
41 | Robert McCaa, Steven Ruggles, Michael J. Davern, Tami Swenson, Krishna Mohan Palipudi |
IPUMS-International High Precision Population Census Microdata Samples: Balancing the Privacy-Quality Tradeoff by Means of Restricted Access Extracts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy in Statistical Databases ![In: Privacy in Statistical Databases, CENEX-SDC Project International Conference, PSD 2006, Rome, Italy, December 13-15, 2006, Proceedings, pp. 375-382, 2006, Springer, 3-540-49330-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Census microdata samples, IPUMS-International, data quality, data privacy |
41 | Thomas Demuth |
A Passive Attack on the Privacy of Web Users Using Standard Log Information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy Enhancing Technologies ![In: Privacy Enhancing Technologies, Second International Workshop, PET 2002, San Francisco, CA, USA, April 14-15, 2002, Revised Papers, pp. 179-193, 2002, Springer, 3-540-00565-X. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
user tracking and profiling, server logs, privacy, World Wide Web, anonymity |
41 | Shaozhi Ye, Shyhtsun Felix Wu, Raju Pandey, Hao Chen 0003 |
Noise Injection for Search Privacy Protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSE (3) ![In: Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, CSE 2009, Vancouver, BC, Canada, August 29-31, 2009, pp. 1-8, 2009, IEEE Computer Society, 978-1-4244-5334-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
41 | Xiaoyi Yu, Kenta Chinomi, Takashi Koshimizu, Naoko Nitta, Yoshimichi Ito, Noboru Babaguchi |
Privacy protecting visual processing for secure video surveillance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIP ![In: Proceedings of the International Conference on Image Processing, ICIP 2008, October 12-15, 2008, San Diego, California, USA, pp. 1672-1675, 2008, IEEE, 978-1-4244-1765-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
41 | Guangzhen Li, Yoshimichi Ito, Xiaoyi Yu, Naoko Nitta, Noboru Babaguchi |
A discrete wavelet transform based recoverable image processing for privacy protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIP ![In: Proceedings of the International Conference on Image Processing, ICIP 2008, October 12-15, 2008, San Diego, California, USA, pp. 1372-1375, 2008, IEEE, 978-1-4244-1765-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
41 | Karsten Nohl, David Evans 0001 |
Hiding in Groups: On the Expressiveness of Privacy Distributions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Proceedings of The IFIP TC-11 23rd International Information Security Conference, IFIP 20th World Computer Congress, IFIP SEC 2008, September 7-10, 2008, Milano, Italy, pp. 1-15, 2008, Springer, 978-0-387-09698-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
41 | Seiya Miyazaki, Nancy R. Mead, Justin Zhan |
Computer-Aided Privacy Requirements Elicitation Technique. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APSCC ![In: Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, APSCC 2008, Yilan, Taiwan, 9-12 December 2008, pp. 367-372, 2008, IEEE Computer Society, 978-0-7695-3473-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
41 | Simon Moncrieff, Svetha Venkatesh, Geoff A. W. West |
Privacy and the access of information in a smart house environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Multimedia ![In: Proceedings of the 15th International Conference on Multimedia 2007, Augsburg, Germany, September 24-29, 2007, pp. 671-680, 2007, ACM, 978-1-59593-702-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
41 | Matt Duckham, Lars Kulik, Athol Birtley |
A Spatiotemporal Model of Strategies and Counter Strategies for Location Privacy Protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GIScience ![In: Geographic Information Science, 4th International Conference, GIScience 2006, Münster, Germany, September 20-23, 2006, Proceedings, pp. 47-64, 2006, Springer, 3-540-44526-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
41 | Chai Wah Wu |
Privacy preserving data mining with unidirectional interaction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCAS (6) ![In: International Symposium on Circuits and Systems (ISCAS 2005), 23-26 May 2005, Kobe, Japan, pp. 5521-5524, 2005, IEEE, 0-7803-8834-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
41 | Günter Karjoth, Matthias Schunter, Michael Waidner |
Privacy-Enabled Services for Enterprises. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA Workshops ![In: 13th International Workshop on Database and Expert Systems Applications (DEXA 2002), 2-6 September 2002, Aix-en-Provence, France, pp. 483-487, 2002, IEEE Computer Society, 0-7695-1668-8. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
41 | Jeremy Goecks, W. Keith Edwards, Elizabeth D. Mynatt |
Challenges in supporting end-user privacy and security management with social navigation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOUPS ![In: Proceedings of the 5th Symposium on Usable Privacy and Security, SOUPS 2009, Mountain View, California, USA, July 15-17, 2009, 2009, ACM, 978-1-60558-736-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
acumen, bonfire, end-user privacy and security, herding, decision making, social navigation, informational cascades |
41 | Peter Christen |
Geocode Matching and Privacy Preservation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PinKDD ![In: Privacy, Security, and Trust in KDD, Second ACM SIGKDD International Workshop, PinKDD 2008, Las Vegas, NV, USA, August 24, 2008, Revised Selected Papers, pp. 7-24, 2008, Springer, 978-3-642-01717-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
privacy preservation, secure multi-party computations, record linkage, entity resolution, geocoding, Data matching |
41 | Aleksej Jerman Blazic, Kajetan Dolinar, Jan Porekar |
Enabling Privacy in Pervasive Computing Using Fusion of Privacy Negotiation, Identity Management and Trust Management Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDS ![In: First International Conference on the Digital Society (ICDS 2007), 2-6 January 2007, Guadeloupe, French Caribbean, pp. 30, 2007, IEEE Computer Society, 978-0-7695-2760-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Policy negotiation, Privacy, Trust management, Identity management, Pervasive systems, Personal information, Virtual identity |
41 | David Molnar, Andrea Soppera, David A. Wagner 0001 |
Privacy for RFID through trusted computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WPES ![In: Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, WPES 2005, Alexandria, VA, USA, November 7, 2005, pp. 31-34, 2005, ACM, 1-59593-228-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
privacy, RFID, trusted computing, audit |
41 | Keith Irwin, Ting Yu 0001 |
Determining user privacy preferences by asking the right questions: an automated approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WPES ![In: Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, WPES 2005, Alexandria, VA, USA, November 7, 2005, pp. 47-50, 2005, ACM, 1-59593-228-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
APPEL, privacy, preferences, P3P |
40 | Lei Zhang 0004, Alexander Brodsky 0001, Sushil Jajodia |
Restoring compromised privacy in micro-data disclosure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2010, Beijing, China, April 13-16, 2010, pp. 36-47, 2010, ACM, 978-1-60558-936-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
micro-data disclosure, data privacy |
40 | Daniel Kifer, Bing-Rong Lin |
Towards an axiomatization of statistical privacy and utility. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PODS ![In: Proceedings of the Twenty-Ninth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, PODS 2010, June 6-11, 2010, Indianapolis, Indiana, USA, pp. 147-158, 2010, ACM, 978-1-4503-0033-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
privacy, utility, axioms |
40 | Ian Reay, Scott Dick, James Miller 0001 |
A large-scale empirical study of P3P privacy policies: Stated actions vs. legal obligations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Web ![In: ACM Trans. Web 3(2), pp. 6:1-6:34, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
legislation and enforcement, electronic commerce, Privacy protection, P3P |
40 | Yuan Tian 0003, Biao Song, Eui-nam Huh |
A threat-based privacy preservation system in untrusted environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICHIT ![In: Proceedings of the 2009 International Conference on Hybrid Information Technology, ICHIT 2009, Daejeon, Korea, August 27-29, 2009, pp. 102-107, 2009, ACM, 978-1-60558-662-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
threaten, privacy, purpose |
40 | Nabil Ajam, Ahmed Bouabdallah |
Privacy Improvement through Pseudonymity in Parlay X for Location Based Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICN ![In: Seventh International Conference on Networking (ICN 2008), 13-18 April 2008, Cancun, Mexico, pp. 713-718, 2008, IEEE Computer Society, 978-0-7695-3106-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Parlay X, web services, Privacy, Location based services, formal model, Pseudonymity |
40 | Anna Cinzia Squicciarini, Elisa Bertino, Elena Ferrari, Federica Paci, Bhavani Thuraisingham |
PP-trust-X: A system for privacy preserving trust negotiations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 10(3), pp. 12, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
privacy, Access control, strategy, credentials, attribute-based access control, automated trust negotiation |
40 | Denise L. Anthony, Tristan Henderson, David Kotz |
Privacy in Location-Aware Computing Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Pervasive Comput. ![In: IEEE Pervasive Comput. 6(4), pp. 64-72, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
location-dependent, location-sensitive, privacy, pervasive computing, location-aware |
40 | Patrick C. K. Hung, Dickson K. W. Chiu, W. W. Fung, William K. Cheung 0001, Raymond K. Wong 0001, Samuel P. M. Choi, Eleanna Kafeza, James T. Kwok, Joshua C. C. Pun, Vivying S. Y. Cheng |
End-to-end privacy control in service outsourcing of human intensive processes: A multi-layered Web service integration approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Syst. Frontiers ![In: Inf. Syst. Frontiers 9(1), pp. 85-101, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Web service integration, Need-to-know principle, APPEL, SLA, Privacy policies, P3P, Layered architecture |
40 | Daniel V. Bailey, Dan Boneh, Eu-Jin Goh, Ari Juels |
Covert channels in privacy-preserving identification systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2007 ACM Conference on Computer and Communications Security, CCS 2007, Alexandria, Virginia, USA, October 28-31, 2007, pp. 297-306, 2007, ACM, 978-1-59593-703-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
privacy, mobile, identification, covert channels, rfid |
40 | Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciarini, Matthew Young, Elisa Bertino |
Privacy Requirements in Identity Management Solutions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HCI (9) ![In: Human Interface and the Management of Information. Interacting in Information Environments, Symposium on Human Interface 2007, Held as Part of HCI International 2007, Beijing, China, July 22-27, 2007, Proceedings, Part II, pp. 694-702, 2007, Springer, 978-3-540-73353-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Social and Legal Concerns, Security, Privacy, Identity Management |
40 | Jon M. Kleinberg |
Challenges in mining social network data: processes, privacy, and paradoxes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KDD ![In: Proceedings of the 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, San Jose, California, USA, August 12-15, 2007, pp. 4-5, 2007, ACM, 978-1-59593-609-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
privacy in data mining, data mining, social networks, anonymization, diffusion of innovations |
40 | Hugo A. Mitre-Hernández, Ana Isabel González-Tablas Ferreres, Benjamín Ramos, Arturo Ribagorda |
A Legal Ontology to Support Privacy Preservation in Location-Based Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OTM Workshops (2) ![In: On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, OTM Confederated International Workshops and Posters, AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET, OnToContent, ORM, PerSys, OTM Academy Doctoral Consortium, RDDS, SWWS, and SeBGIS 2006, Montpellier, France, October 29 - November 3, 2006. Proceedings, Part II, pp. 1755-1764, 2006, Springer, 3-540-48273-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Ontology, privacy, location-based services, regulation |
40 | Dan Hong, Mingxuan Yuan, Vincent Y. Shen |
Dynamic privacy management: a plug-in service for the middleware in pervasive computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mobile HCI ![In: Proceedings of the 7th Conference on Human-Computer Interaction with Mobile Devices and Services, Mobile HCI 2005, 2005, Salzburg, Austria, September 19-22, 2005, pp. 1-8, 2005, ACM, 1-59593-089-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
privacy, middleware, pervasive computing, context, P3P |
40 | Rajiv T. Maheswaran, Jonathan P. Pearce, Pradeep Varakantham, Emma Bowring, Milind Tambe |
Valuations of Possible States (VPS): a quantitative framework for analysis of privacy loss among collaborative personal assistant agents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAMAS ![In: 4th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2005), July 25-29, 2005, Utrecht, The Netherlands, pp. 1030-1037, 2005, ACM, 1-59593-094-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
collaborative negotiation, personal assistant agents, privacy |
40 | Abdelmounaam Rezgui, Mourad Ouzzani, Athman Bouguettaya, Brahim Medjahed |
Preserving privacy in web services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WIDM ![In: Fourth ACM CIKM International Workshop on Web Information and Data Management (WIDM 2002), SAIC Headquaters, McLean, Virginia, USA, November 8, 2002, pp. 56-62, 2002, ACM. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
web services, privacy, mobile agents, digital government |
40 | Winnie Chung, John Paynter |
Privacy Issues on the Internet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 35th Hawaii International Conference on System Sciences (HICSS-35 2002), CD-ROM / Abstracts Proceedings, 7-10 January 2002, Big Island, HI, USA, pp. 193, 2002, IEEE Computer Society, 0-7695-1435-9. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Security, Internet, Privacy |
40 | Jan Muntermann, Heiko Roßnagel |
On the Effectiveness of Privacy Breach Disclosure Legislation in Europe: Empirical Evidence from the US Stock Market. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NordSec ![In: Identity and Privacy in the Internet Age, 14th Nordic Conference on Secure IT Systems, NordSec 2009, Oslo, Norway, 14-16 October 2009. Proceedings, pp. 1-14, 2009, Springer, 978-3-642-04765-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Privacy Breaches, Privacy Disclosure Regulation, Event Study |
40 | Martin Gisch, Alexander De Luca, Markus Blanchebarbe |
The privacy badge: a privacy-awareness user interface for small devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mobility Conference ![In: Proceedings of the 4th International Conference on Mobile Technology, Applications, and Systems and the 1st International Symposium on Computer Human Interaction in Mobile Technology, Mobility Conference 2007, Singapore, September 10-12, 2007, pp. 583-586, 2007, ACM, 978-1-59593-819-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
privacy awareness, privacy, user interfaces, mobile devices |
40 | Wenliang Du, Mikhail J. Atallah |
Secure multi-party computation problems and their applications: a review and open problems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSPW ![In: Proceedings of the New Security Paradigms Workshop 2001, Cloudcroft, New Mexico, USA, September 10-13, 2001, pp. 13-22, 2001, ACM, 1-58113-457-6. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
privacy, secure multi-party computation |
39 | Sarah Spiekermann |
RFID and privacy: what consumers really want and fear. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Pers. Ubiquitous Comput. ![In: Pers. Ubiquitous Comput. 13(6), pp. 423-434, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Privacy, RFID, Behavior, Acceptance, Privacy Enhancing Technologies (PETs) |
39 | Raghu K. Ganti, Nam Pham, Yu-En Tsai, Tarek F. Abdelzaher |
PoolView: stream privacy for grassroots participatory sensing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SenSys ![In: Proceedings of the 6th International Conference on Embedded Networked Sensor Systems, SenSys 2008, Raleigh, NC, USA, November 5-7, 2008, pp. 281-294, 2008, ACM, 978-1-59593-990-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
grassroots participatory sensing, stream privacy, privacy, architecture, data perturbation |
39 | Shyam K. Gupta 0001, Vikram Goyal, Anand Gupta |
Precomputation of privacy policy parameters for auditing SQL queries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICUIMC ![In: Proceedings of the 2nd International Conference on Ubiquitous Information Management and Communication, ICUIMC 2008, Suwon, Korea, January 31 - February 01, 2008, pp. 87-93, 2008, ACM, 978-1-59593-993-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
privacy violation detection, privacy, auditing, compliance, inference control, information disclosure |
39 | Sarah Spiekermann |
Privacy Enhancing Technologies for RFID in Retail- An Empirical Investigation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UbiComp ![In: UbiComp 2007: Ubiquitous Computing, 9th International Conference, UbiComp 2007, Innsbruck, Austria, September 16-19, 2007, Proceedings, pp. 56-72, 2007, Springer, 978-3-540-74852-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
RFID killfunction, security, privacy, authentication, RFID, identification, user behavior, privacy enhancing technology |
39 | Pankaj Bhaskar, Sheikh Iqbal Ahamed |
Privacy in Pervasive Computing and Open Issues. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Second International Conference on Availability, Reliability and Security, ARES 2007, The International Dependability Conference - Bridging Theory and Practice, April 10-13 2007, Vienna, Austria, pp. 147-154, 2007, IEEE Computer Society, 0-7695-2775-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Security, Privacy, Trust, Pervasive Computing, Location Privacy |
39 | Maria Karyda 0001, Stefanos Gritzalis, Jong Hyuk Park |
A Critical Approach to Privacy Research in Ubiquitous Environments - Issues and Underlying Assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUC Workshops ![In: Emerging Directions in Embedded and Ubiquitous Computing, EUC 2007 Workshops: TRUST, WSOC, NCUS, UUWSN, USN, ESO, and SECUBIQ, Taipei, Taiwan, December 17-20, 2007, Proceedings, pp. 12-21, 2007, Springer, 978-3-540-77089-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Privacy Rights, Asymmetry of Power, Asymmetry of Information, Ubiquitous Computing, Privacy Protection |
39 | Zhiqiang Yang, Rebecca N. Wright |
Privacy-Preserving Computation of Bayesian Networks on Vertically Partitioned Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Knowl. Data Eng. ![In: IEEE Trans. Knowl. Data Eng. 18(9), pp. 1253-1264, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Bayesian networks, privacy-preserving data mining, Data privacy |
39 | Josep Domingo-Ferrer |
Microaggregation for Database and Location Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NGITS ![In: Next Generation Information Technologies and Systems, 6th International Workshop, NGITS 2006, Kibbutz Shefayim, Israel, July 4-6, 2006, Proceedings, pp. 106-116, 2006, Springer, 3-540-35472-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Statistical database privacy, Location privacy, k-Anonymity, Wireless systems, Microaggregation |
39 | Latanya Sweeney |
Privacy-enhanced linking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGKDD Explor. ![In: SIGKDD Explor. 7(2), pp. 72-75, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
privacy, link analysis, privacy-enhanced technology |
39 | Rüdiger Grimm, Alexander Roßnagel |
Can P3P help to protect privacy worldwide? ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Multimedia Workshops ![In: Proceedings of the ACM Multimedia 2000 Workshops, Los Angeles, CA, USA, October 30 - November 3, 2000, pp. 157-160, 2000, ACM Press, 1-58113-311-1. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
privacy technology, privacy, regulation, P3P, law enforcement, self-regulation, PICS |
39 | Claudio A. Ardagna, Sushil Jajodia, Pierangela Samarati, Angelos Stavrou |
Privacy Preservation over Untrusted Mobile Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy in Location-Based Applications ![In: Privacy in Location-Based Applications, Research Issues and Emerging Trends [This book was partially born out of the First International Workshop on Privacy in Location-Based Applications (PiLBA 2008) held in Malaga, Spain, in October 2008, in conjunction with the 13th European Symposium on Research in Computer Security]., pp. 84-105, 2009, Springer, 978-3-642-03510-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
39 | Daniele Riboni, Linda Pareschi, Claudio Bettini |
Privacy in Georeferenced Context-Aware Services: A Survey. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy in Location-Based Applications ![In: Privacy in Location-Based Applications, Research Issues and Emerging Trends [This book was partially born out of the First International Workshop on Privacy in Location-Based Applications (PiLBA 2008) held in Malaga, Spain, in October 2008, in conjunction with the 13th European Symposium on Research in Computer Security]., pp. 151-172, 2009, Springer, 978-3-642-03510-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
39 | Dawn N. Jutla, Peter Bodorik |
Sociotechnical Architecture for Online Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 3(2), pp. 29-39, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
controlling online privacy, Web privacy, privacy, P3P |
38 | Barath Raghavan, Tadayoshi Kohno, Alex C. Snoeren, David Wetherall |
Enlisting ISPs to Improve Online Privacy: IP Address Mixing by Default. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy Enhancing Technologies ![In: Privacy Enhancing Technologies, 9th International Symposium, PETS 2009, Seattle, WA, USA, August 5-7, 2009. Proceedings, pp. 143-163, 2009, Springer, 978-3-642-03167-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
38 | Claudio Bettini, Sergio Mascetti, Xiaoyang Sean Wang, Dario Freni, Sushil Jajodia |
Anonymity and Historical-Anonymity in Location-Based Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy in Location-Based Applications ![In: Privacy in Location-Based Applications, Research Issues and Emerging Trends [This book was partially born out of the First International Workshop on Privacy in Location-Based Applications (PiLBA 2008) held in Malaga, Spain, in October 2008, in conjunction with the 13th European Symposium on Research in Computer Security]., pp. 1-30, 2009, Springer, 978-3-642-03510-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
38 | Aaron Richard Coble |
Formalized Information-Theoretic Proofs of Privacy Using the HOL4 Theorem-Prover. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy Enhancing Technologies ![In: Privacy Enhancing Technologies, 8th International Symposium, PETS 2008, Leuven, Belgium, July 23-25, 2008, Proceedings, pp. 77-98, 2008, Springer, 978-3-540-70629-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
38 | Ge Zhong, Ian Goldberg, Urs Hengartner |
Louis, Lester and Pierre: Three Protocols for Location Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy Enhancing Technologies ![In: Privacy Enhancing Technologies, 7th International Symposium, PET 2007 Ottawa, Canada, June 20-22, 2007, Revised Selected Papers, pp. 62-76, 2007, Springer, 978-3-540-75550-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
38 | Matthias Schunter, Michael Waidner |
Simplified Privacy Controls for Aggregated Services - Suspend and Resume of Personal Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy Enhancing Technologies ![In: Privacy Enhancing Technologies, 7th International Symposium, PET 2007 Ottawa, Canada, June 20-22, 2007, Revised Selected Papers, pp. 218-232, 2007, Springer, 978-3-540-75550-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
38 | John Solis, Gene Tsudik |
Simple and Flexible Revocation Checking with Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy Enhancing Technologies ![In: Privacy Enhancing Technologies, 6th International Workshop, PET 2006, Cambridge, UK, June 28-30, 2006, Revised Selected Papers, pp. 351-367, 2006, Springer, 3-540-68790-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
38 | Anna Cinzia Squicciarini, Abhilasha Bhargav-Spantzel, Alexei Czeskis, Elisa Bertino |
Traceable and Automatic Compliance of Privacy Policies in Federated Digital Identity Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy Enhancing Technologies ![In: Privacy Enhancing Technologies, 6th International Workshop, PET 2006, Cambridge, UK, June 28-30, 2006, Revised Selected Papers, pp. 78-98, 2006, Springer, 3-540-68790-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
38 | Mansour Alsaleh, Carlisle Adams |
Enhancing Consumer Privacy in the Liberty Alliance Identity Federation and Web Services Frameworks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy Enhancing Technologies ![In: Privacy Enhancing Technologies, 6th International Workshop, PET 2006, Cambridge, UK, June 28-30, 2006, Revised Selected Papers, pp. 59-77, 2006, Springer, 3-540-68790-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
38 | Birgit Pfitzmann |
Privacy in Enterprise Identity Federation - Policies for Liberty Single Signon. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy Enhancing Technologies ![In: Privacy Enhancing Technologies, Third International Workshop, PET 2003, Dresden, Germany, March 26-28, 2003, Revised Papers, pp. 189-204, 2003, Springer, 3-540-20610-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
38 | Rafail Ostrovsky, William E. Skeith III |
Private Searching on Streaming Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings, pp. 223-240, 2005, Springer, 3-540-28114-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Crypto-computing, Public-key Encryption with special properties, Privacy-Preserving Keyword Search, Secure Algorithms for Streaming Data, Privacy-Preserving Datamining, Secure Delegation of Computation, Searching with Privacy, Software security, Mobile code, Database security, Private Information Retrieval, Code Obfuscation |
38 | Emmanouil Magkos, Manolis Maragoudakis, Vassilios Chrissikopoulos, Stefanos Gritzalis |
Accuracy in Privacy-Preserving Data Mining Using the Paradigm of Cryptographic Elections. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy in Statistical Databases ![In: Privacy in Statistical Databases, UNESCO Chair in Data Privacy International Conference, PSD 2008, Istanbul, Turkey, September 24-26, 2008. Proceedings, pp. 284-297, 2008, Springer, 978-3-540-87470-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Privacy and accuracy, Frequency mining, Distributed systems, Homomorphic encryption |
38 | Daniel E. O'Leary |
Some Privacy Issues in Knowledge Discovery: The OECD Personal Privacy Guidelines. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Expert ![In: IEEE Expert 10(2), pp. 48-52, 1995. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
|
37 | Alberto Maria Segre, Andrew Wildenberg, Veronica J. Vieland, Ying Zhang |
Privacy-Preserving Data Set Union. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy in Statistical Databases ![In: Privacy in Statistical Databases, CENEX-SDC Project International Conference, PSD 2006, Rome, Italy, December 13-15, 2006, Proceedings, pp. 266-276, 2006, Springer, 3-540-49330-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
privacy-presenting data mining, blind database union |
37 | Josep Domingo-Ferrer, Francesc Sebé, Jordi Castellà-Roca |
On the Security of Noise Addition for Privacy in Statistical Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy in Statistical Databases ![In: Privacy in Statistical Databases: CASC Project International Workshop, PSD 2004, Barcelona, Spain, June 9-11, 2004. Proceedings, pp. 149-161, 2004, Springer, 3-540-22118-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Statistical disclosure limitation, Respondents privacy, Data security, Statistical disclosure control, Noise addition, Statistical database protection |
37 | Hugo L. Jonker, Sjouke Mauw, Jun Pang 0001 |
Measuring Voter-Controlled Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Forth International Conference on Availability, Reliability and Security, ARES 2009, March 16-19, 2009, Fukuoka, Japan, pp. 289-298, 2009, IEEE Computer Society, 978-1-4244-3572-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
37 | Kim Wuyts, Riccardo Scandariato, Bart De Decker, Wouter Joosen |
Linking Privacy Solutions to Developer Goals. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Forth International Conference on Availability, Reliability and Security, ARES 2009, March 16-19, 2009, Fukuoka, Japan, pp. 847-852, 2009, IEEE Computer Society, 978-1-4244-3572-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
37 | Kambiz Ghazinour, Maryam Majedi, Ken Barker 0001 |
A Model for Privacy Policy Visualization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC (2) ![In: Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, COMPSAC 2009, Seattle, Washington, USA, July 20-24, 2009. Volume 2, pp. 335-340, 2009, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
Displaying result #101 - #200 of 63336 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ >>] |
|