|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 11410 occurrences of 3224 keywords
|
|
|
Results
Found 63337 publication records. Showing 63336 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
37 | Min Li, Xiaoxun Sun, Hua Wang 0002, Yanchun Zhang |
Optimal Privacy-Aware Path in Hippocratic Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DASFAA ![In: Database Systems for Advanced Applications, 14th International Conference, DASFAA 2009, Brisbane, Australia, April 21-23, 2009. Proceedings, pp. 441-455, 2009, Springer, 978-3-642-00886-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
37 | Florian Schaub, Zhendong Ma, Frank Kargl |
Privacy Requirements in Vehicular Communication Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSE (3) ![In: Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, CSE 2009, Vancouver, BC, Canada, August 29-31, 2009, pp. 139-145, 2009, IEEE Computer Society, 978-1-4244-5334-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
37 | Ching Yu Ng, Willy Susilo, Yi Mu 0001, Reihaneh Safavi-Naini |
New Privacy Results on Synchronized RFID Authentication Protocols against Tag Tracing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings, pp. 321-336, 2009, Springer, 978-3-642-04443-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
37 | Esma Aïmeur, Sébastien Gambs, Ai Ho |
UPP: User Privacy Policy for Social Networking Sites. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIW ![In: Fourth International Conference on Internet and Web Applications and Services, ICIW 2009, 24-28 May 2009, Venice/Mestre, Italy, pp. 267-272, 2009, IEEE Computer Society, 978-0-7695-3613-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
37 | Bhavani Thuraisingham |
On the Complexity of the Privacy Problem in Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining: Foundations and Practice ![In: Data Mining: Foundations and Practice, pp. 353-374, 2008, Springer, 978-3-540-78487-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
37 | Charu C. Aggarwal |
On Unifying Privacy and Uncertain Data Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDE ![In: Proceedings of the 24th International Conference on Data Engineering, ICDE 2008, April 7-12, 2008, Cancún, Mexico, pp. 386-395, 2008, IEEE Computer Society, 978-1-4244-1836-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
37 | Namje Park, Youjin Song, Dongho Won |
Policy and role based mobile RFID user privacy data management system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NOMS ![In: IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, NOMS 2008, 7-11 April 2008, Salvador, Bahia, Brazil, pp. 1003-1006, 2008, IEEE, 978-1-4244-2066-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
37 | Yeonjung Kang, Hyangjin Lee, Kilsoo Chun, Junghwan Song |
Classification of Privacy Enhancing Technologies on Life-cycle of Information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: Proceedings of the First International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2007, October 14-20, 2007, Valencia, Spain, pp. 66-70, 2007, IEEE Computer Society, 0-7695-2989-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
37 | Susana Alcalde Bagüés, Andreas Zeidler, Carlos Fernández-Valdivielso, Ignacio R. Matías |
Towards Personal Privacy Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OTM Workshops (2) ![In: On the Move to Meaningful Internet Systems 2007: OTM 2007 Workshops, OTM Confederated International Workshops and Posters, AWeSOMe, CAMS, OTM Academy Doctoral Consortium, MONET, OnToContent, ORM, PerSys, PPN, RDDS, SSWS, and SWWS 2007, Vilamoura, Portugal, November 25-30, 2007, Proceedings, Part II, pp. 886-895, 2007, Springer, 978-3-540-76889-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
37 | Sören Preibusch |
Spontaneous Privacy Policy Negotiations in Pervasive Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OTM Workshops (2) ![In: On the Move to Meaningful Internet Systems 2007: OTM 2007 Workshops, OTM Confederated International Workshops and Posters, AWeSOMe, CAMS, OTM Academy Doctoral Consortium, MONET, OnToContent, ORM, PerSys, PPN, RDDS, SSWS, and SWWS 2007, Vilamoura, Portugal, November 25-30, 2007, Proceedings, Part II, pp. 814-823, 2007, Springer, 978-3-540-76889-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
37 | Ankur Chattopadhyay, Terrance E. Boult |
PrivacyCam: a Privacy Preserving Camera Using uCLinux on the Blackfin DSP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CVPR ![In: 2007 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR 2007), 18-23 June 2007, Minneapolis, Minnesota, USA, 2007, IEEE Computer Society, 1-4244-1179-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
37 | Geoff Skinner |
The TLC-PP framework for delivering a Privacy Augmented Collaborative Environment (PACE). ![Search on Bibsonomy](Pics/bibsonomy.png) |
CollaborateCom ![In: Proceedings of the 3rd International Conference on Collaborative Computing: Networking, Applications and Worksharing, White Plains, New York, USA, November 12-15, 2007, pp. 289-293, 2007, IEEE Computer Society / ICST, 1-4244-1317-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
37 | Li Liu, Bhavani Thuraisingham |
The Applicability of the Perturbation Model-based Privacy Preserving Data Mining for Real-world Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDM Workshops ![In: Workshops Proceedings of the 6th IEEE International Conference on Data Mining (ICDM 2006), 18-22 December 2006, Hong Kong, China, pp. 507-512, 2006, IEEE Computer Society, 0-7695-2702-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
37 | Susana Alcalde Bagüés, Andreas Zeidler, Carlos Fernández-Valdivielso, Ignacio R. Matías |
A User-Centric Privacy Framework for Pervasive Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OTM Workshops (2) ![In: On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, OTM Confederated International Workshops and Posters, AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET, OnToContent, ORM, PerSys, OTM Academy Doctoral Consortium, RDDS, SWWS, and SeBGIS 2006, Montpellier, France, October 29 - November 3, 2006. Proceedings, Part II, pp. 1347-1356, 2006, Springer, 3-540-48273-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
37 | Weider D. Yu, Sharanya Doddapaneni, Savitha Murthy |
A Privacy Assessment Approach for Serviced Oriented Architecture Application. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOSE ![In: The 2006 International Workshop on Service Oriented Software Engineering (IW-SOSE '06), May 27-28, 2006, Shanghai, China, in conjunction with ICSE 2006, pp. 67-75, 2006, IEEE Computer Society, 0-7695-2726-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
37 | Hyang-Chang Choi, Seungyong Lee 0001, HyungHyo Lee |
Design and Implementation of a Policy-Based Privacy Authorization System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: Intelligence and Security Informatics, IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, USA, May 23-24, 2006, Proceedings, pp. 129-140, 2006, Springer, 3-540-34478-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
37 | Yin Hua Li, Salima Benbernou |
Representing and Reasoning About Privacy Abstractions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISE ![In: Web Information Systems Engineering - WISE 2005, 6th International Conference on Web Information Systems Engineering, New York, NY, USA, November 20-22, 2005, Proceedings, pp. 390-403, 2005, Springer, 3-540-30017-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
37 | Elisa Bertino |
Purpose Based Access Control for Privacy Protection in Database Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DASFAA ![In: Database Systems for Advanced Applications, 10th International Conference, DASFAA 2005, Beijing, China, April 17-20, 2005, Proceedings, pp. 2, 2005, Springer, 3-540-25334-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
37 | Hyang-Chang Choi, YongHoon Yi, Jae-Hyun Seo, BongNam Noh, HyungHyo Lee |
A Privacy Protection Model in ID Management Using Access Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (2) ![In: Computational Science and Its Applications - ICCSA 2005, International Conference, Singapore, May 9-12, 2005, Proceedings, Part II, pp. 82-91, 2005, Springer, 3-540-25861-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
37 | Pranam Kolari, Li Ding 0001, Shashidhara Ganjugunte, Anupam Joshi, Timothy W. Finin, Lalana Kagal |
Enhancing Web Privacy Protection through Declarative Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: 6th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2005), 6-8 June 2005, Stockholm, Sweden, pp. 57-66, 2005, IEEE Computer Society, 0-7695-2265-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
37 | Geoff Skinner, Song Han 0004, Elizabeth Chang 0001 |
A Framework of Privacy Shield in Organizational Information Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICMB ![In: 2005 International Conference on Mobile Business (ICMB 2005), 11-13 July 2005, Sydney, Australia, pp. 647-650, 2005, IEEE Computer Society, 0-7695-2367-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
37 | Bowonsak Seisungsittisunti, Juggapong Natwichai |
Incremental privacy preservation for associative classification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIKM-PAVLAD ![In: Proceeding of the ACM First International Workshop on Privacy and Anonymity for Very Large Databases, CIKM-PAVLAD 2009, Hong Kong, China, November 6, 2009, pp. 37-44, 2009, ACM. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
privacy-preservation, associative classification, incremental processing |
37 | Wenliang Du, Zhouxuan Teng, Zutao Zhu |
Privacy-MaxEnt: integrating background knowledge in privacy quantification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMOD Conference ![In: Proceedings of the ACM SIGMOD International Conference on Management of Data, SIGMOD 2008, Vancouver, BC, Canada, June 10-12, 2008, pp. 459-472, 2008, ACM, 978-1-60558-102-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
privacy quantification, data publishing |
37 | Yaron Rachlin, Katharina Probst, Rayid Ghani |
Maximizing Privacy under Data Distortion Constraints in Noise Perturbation Methods. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PinKDD ![In: Privacy, Security, and Trust in KDD, Second ACM SIGKDD International Workshop, PinKDD 2008, Las Vegas, NV, USA, August 24, 2008, Revised Selected Papers, pp. 92-110, 2008, Springer, 978-3-642-01717-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Noise perturbation, privacy, anonymity, statistical disclosure control |
37 | Gabriel Ghinita |
Understanding the privacy-efficiency trade-off in location based queries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SPRINGL ![In: Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS, SPRINGL 2008, November 4, 2008, Irvine, California, USA, Proceedings, pp. 1-5, 2008, ACM. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
query privacy, location anonymity |
37 | Jeremy P. Birnholtz, Carl Gutwin, Kirstie Hawkey |
Privacy in the open: how attention mediates awareness and privacy in open-plan offices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GROUP ![In: Proceedings of the 2007 International ACM SIGGROUP Conference on Supporting Group Work, GROUP 2007, Sanibel Island, Florida, USA, November 4-7, 2007, pp. 51-60, 2007, ACM, 978-1-59593-845-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
privacy, awareness, attention, group work |
37 | Steven Gevers, Kristof Verslype, Bart De Decker |
Enhancing privacy in identity management systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WPES ![In: Proceedings of the 2007 ACM Workshop on Privacy in the Electronic Society, WPES 2007, Alexandria, VA, USA, October 29, 2007, pp. 60-63, 2007, ACM, 978-1-59593-883-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
microsoft cardspace, private credentials, security, privacy, identity managment systems |
37 | Robson Eduardo De Grande, Sérgio Donizetti Zorzo |
Privacy protection without impairing personalization by using the extended system MASKS and the extended contextualized P3P privacy policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WebMedia ![In: Proceedings of the 12th Brazilian Symposium on Multimedia and the Web, WebMedia 2006, Natal, Rio Grande do Norte, Brazil, November 19-22, 2006, pp. 89-98, 2006, ACM, 85-7669-100-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
privacy, personalization, navigation, web, user |
37 | Janne Lindqvist, Laura Takkinen |
Privacy management for secure mobility. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WPES ![In: Proceedings of the 2006 ACM Workshop on Privacy in the Electronic Society, WPES 2006, Alexandria, VA, USA, October 30, 2006, pp. 63-66, 2006, ACM, 1-59593-556-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
privacy, mobility, authentication, host identity protocol |
37 | Carolyn Brodie, Clare-Marie Karat, John Karat |
An empirical study of natural language parsing of privacy policy rules using the SPARCLE policy workbench. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOUPS ![In: Proceedings of the 2nd Symposium on Usable Privacy and Security, SOUPS 2006, Pittsburgh, Pennsylvania, USA, July 12-14, 2006, pp. 8-19, 2006, ACM, 1-59593-448-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
security, privacy, design, usability, policy, social and legal issues |
37 | Yin Hua Li, Hye-Young Paik, Boualem Benatallah |
Formal consistency verification between BPEL process and privacy policy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006, pp. 26, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
consistency verification, business process, graph transformation, privacy policy |
37 | Carlos Jensen, Colin Potts |
Privacy policies as decision-making tools: an evaluation of online privacy notices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI ![In: Proceedings of the 2004 Conference on Human Factors in Computing Systems, CHI 2004, Vienna, Austria, April 24 - 29, 2004, pp. 471-478, 2004, ACM, 1-58113-702-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
consent, privacy, WWW, usability, e-commerce, readability |
37 | Adam Barth, John C. Mitchell, Justin Rosenstein |
Conflict and combination in privacy policy languages. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WPES ![In: Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society, WPES 2004, Washington, DC, USA, October 28, 2004, pp. 45-46, 2004, ACM, 1-58113-968-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
policy combination, privacy policy |
37 | William H. Stufflebeam, Annie I. Antón, Qingfeng He, Neha Jain |
Specifying privacy policies with P3P and EPAL: lessons learned. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WPES ![In: Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society, WPES 2004, Washington, DC, USA, October 28, 2004, pp. 35, 2004, ACM, 1-58113-968-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
privacy, requirements engineering, healthcare, P3P, policy specification, EPAL |
37 | Lorrie Faith Cranor |
'I didn't buy it for myself' privacy and ecommerce personalization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WPES ![In: Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society, WPES 2003, Washington, DC, USA, October 30, 2003, pp. 111-117, 2003, ACM, 1-58113-776-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
privacy, personalization, ecommerce |
37 | Josep Domingo-Ferrer, Francesc Sebé |
Optimal Multivariate 2-Microaggregation for Microdata Protection: A 2-Approximation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy in Statistical Databases ![In: Privacy in Statistical Databases, CENEX-SDC Project International Conference, PSD 2006, Rome, Italy, December 13-15, 2006, Proceedings, pp. 129-138, 2006, Springer, 3-540-49330-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Clustering, Privacy-preserving data mining, Statistical disclosure control, Statistical databases, Microaggregation |
36 | Reza Shokri, George Theodorakopoulos 0001, Jean-Yves Le Boudec, Jean-Pierre Hubaux |
Quantifying Location Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Symposium on Security and Privacy ![In: 32nd IEEE Symposium on Security and Privacy, SP 2011, 22-25 May 2011, Berkeley, California, USA, pp. 247-262, 2011, IEEE Computer Society, 978-1-4577-0147-4. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
Location Traces, Quantifying Metric, Location-Privacy Meter, Location Privacy, Evaluation Framework |
36 | Wen Jin, Rong Ge 0002, Weining Qian |
On Robust and Effective K-Anonymity in Large Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PAKDD ![In: Advances in Knowledge Discovery and Data Mining, 10th Pacific-Asia Conference, PAKDD 2006, Singapore, April 9-12, 2006, Proceedings, pp. 621-636, 2006, Springer, 3-540-33206-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
36 | Shyue-Liang Wang, Ayat Jafari |
Using unknowns for hiding sensitive predictive association rules. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IRI ![In: Proceedings of the 2005 IEEE International Conference on Information Reuse and Integration, IRI - 2005, August 15-17, 2005, Las Vegas Hilton, Las Vegas, NV, USA, pp. 223-228, 2005, IEEE Systems, Man, and Cybernetics Society, 0-7803-9093-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
36 | Smriti Bhagat, Graham Cormode, Balachander Krishnamurthy, Divesh Srivastava |
Privacy in dynamic social networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW ![In: Proceedings of the 19th International Conference on World Wide Web, WWW 2010, Raleigh, North Carolina, USA, April 26-30, 2010, pp. 1059-1060, 2010, ACM, 978-1-60558-799-8. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
re-publication, privacy, dynamic networks |
36 | Jan Camenisch, Sebastian Mödersheim, Gregory Neven, Franz-Stefan Preiss, Dieter Sommer |
A card requirements language enabling privacy-preserving access control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 15th ACM Symposium on Access Control Models and Technologies, SACMAT 2010, Pittsburgh, Pennsylvania, USA, June 9-11, 2010, Proceedings, pp. 119-128, 2010, ACM, 978-1-4503-0049-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
privacy, access control, policy languages, anonymous credentials, digital credentials |
36 | Frederic Stutzman, Jacob Kramer-Duffield |
Friends only: examining a privacy-enhancing behavior in facebook. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI ![In: Proceedings of the 28th International Conference on Human Factors in Computing Systems, CHI 2010, Atlanta, Georgia, USA, April 10-15, 2010, pp. 1553-1562, 2010, ACM, 978-1-60558-929-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
privacy, communication, social networking, behavioral modeling, facebook, social network sites |
36 | Cynthia Dwork, Moni Naor, Toniann Pitassi, Guy N. Rothblum |
Differential privacy under continual observation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STOC ![In: Proceedings of the 42nd ACM Symposium on Theory of Computing, STOC 2010, Cambridge, Massachusetts, USA, 5-8 June 2010, pp. 715-724, 2010, ACM, 978-1-4503-0050-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
privacy, private data analysis |
36 | Shipra Agrawal 0001, Jayant R. Haritsa, B. Aditya Prakash |
FRAPP: a framework for high-accuracy privacy-preserving mining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Min. Knowl. Discov. ![In: Data Min. Knowl. Discov. 18(1), pp. 101-139, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Data mining, Privacy |
36 | Julien Bringer, Hervé Chabanne, Thomas Icart |
Efficient zero-knowledge identification schemes which respect privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2009 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2009, Sydney, Australia, March 10-12, 2009, pp. 195-205, 2009, ACM, 978-1-60558-394-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
privacy, identification, zero-knowledge |
36 | Susan Landau 0001, Hubert Lê Van Gông, Robin Wilton |
Achieving Privacy in a Federated Identity Management System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security, 13th International Conference, FC 2009, Accra Beach, Barbados, February 23-26, 2009. Revised Selected Papers, pp. 51-70, 2009, Springer. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
privacy, policy, law, federated identity management |
36 | Oded Nov, Sunil Wattal |
Social computing privacy concerns: antecedents and effects. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI ![In: Proceedings of the 27th International Conference on Human Factors in Computing Systems, CHI 2009, Boston, MA, USA, April 4-9, 2009, pp. 333-336, 2009, ACM, 978-1-60558-246-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
privacy concerns, trust, social computing, Flickr, photo sharing |
36 | Feng Zhang 0012, Gansen Zhao, Tingyan Xing |
Privacy-Preserving Distributed k-Nearest Neighbor Mining on Horizontally Partitioned Multi-Party Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ADMA ![In: Advanced Data Mining and Applications, 5th International Conference, ADMA 2009, Beijing, China, August 17-19, 2009. Proceedings, pp. 755-762, 2009, Springer, 978-3-642-03347-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Privacy-reserving Data Mining, k -NN Mining, Probabilistic Cryptosystem, Communicative Cryptosystem, Secure Multi-party Computation |
36 | Jelena Mirkovic |
Privacy-safe network trace sharing via secure queries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NDA ![In: Proceedings of the 1st ACM workshop on Network Data Anonymization, NDA 2008, Alexandria, VA, USA, October 31, 2008, pp. 3-10, 2008, ACM, 978-1-60558-301-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
network traces, privacy, sharing, sanitization |
36 | Qiong Wei, Yansheng Lu, Qiang Lou |
Privacy-Preserving Data Publishing Based on De-clustering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACIS-ICIS ![In: 7th IEEE/ACIS International Conference on Computer and Information Science, IEEE/ACIS ICIS 2008, 14-16 May 2008, Portland, Oregon, USA, pp. 152-157, 2008, IEEE Computer Society, 978-0-7695-3131-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
de-clustering, privacy-preserving |
36 | Justin Brickell, Vitaly Shmatikov |
The cost of privacy: destruction of data-mining utility in anonymized data publishing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KDD ![In: Proceedings of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Las Vegas, Nevada, USA, August 24-27, 2008, pp. 70-78, 2008, ACM, 978-1-60558-193-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
data mining, privacy, anonymity, utility |
36 | Alexandre V. Evfimievski, Ronald Fagin, David P. Woodruff |
Epistemic privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PODS ![In: Proceedings of the Twenty-Seventh ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, PODS 2008, June 9-11, 2008, Vancouver, BC, Canada, pp. 171-180, 2008, ACM, 978-1-60558-108-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
positivstellensatz, privacy, auditing, query logs, disclosure, reasoning about knowledge, supermodularity |
36 | Yi Hong 0007, Timothy B. Patrick, Rick Gillis |
Protection of Patient's Privacy and Data Security in E-Health Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BMEI (1) ![In: Proceedings of the 2008 International Conference on BioMedical Engineering and Informatics, BMEI 2008, May 28-30, 2008, Sanya, Hainan, China - Volume 1, pp. 643-647, 2008, IEEE Computer Society, 978-0-7695-3118-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
HONcode, HON sites, privacy, data security, E-Health, HIPAA, patients |
36 | Avrim Blum, Katrina Ligett, Aaron Roth 0001 |
A learning theory approach to non-interactive database privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STOC ![In: Proceedings of the 40th Annual ACM Symposium on Theory of Computing, Victoria, British Columbia, Canada, May 17-20, 2008, pp. 609-618, 2008, ACM, 978-1-60558-047-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
non-interactive database privacy, learning theory |
36 | Anna Cinzia Squicciarini, Ayça Azgin Hintoglu, Elisa Bertino, Yücel Saygin |
A privacy preserving assertion based policy language for federation systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 12th ACM Symposium on Access Control Models and Technologies, SACMAT 2007, Sophia Antipolis, France, June 20-22, 2007, Proceedings, pp. 51-60, 2007, ACM, 978-1-59593-745-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
digital identity management, privacy |
36 | Shane Ahern, Dean Eckles, Nathaniel Good, Simon King 0004, Mor Naaman, Rahul Nair |
Over-exposed?: privacy patterns and considerations in online and mobile photo sharing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI ![In: Proceedings of the 2007 Conference on Human Factors in Computing Systems, CHI 2007, San Jose, California, USA, April 28 - May 3, 2007, pp. 357-366, 2007, ACM, 978-1-59593-593-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
online content, privacy, context-aware, location-aware, social software, photo sharing, photos |
36 | Tao Jiang 0004, Helen J. Wang, Yih-Chun Hu |
Preserving location privacy in wireless lans. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiSys ![In: Proceedings of the 5th International Conference on Mobile Systems, Applications, and Services (MobiSys 2007), San Juan, Puerto Rico, June 11-13, 2007, pp. 246-257, 2007, ACM, 978-1-59593-614-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
privacy, localization, 802.11 |
36 | Kirstie Hawkey, Kori M. Inkpen |
PrivateBits: managing visual privacy in web browsers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Graphics Interface ![In: Proceedings of the Graphics Interface 2007 Conference, May 28-30, 2007, Montreal, Canada, pp. 215-223, 2007, ACM Press, 978-1-56881-337-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
incidental information, privacy, web browser, usable security |
36 | Vishal Kapoor, Pascal Poncelet, François Trousset, Maguelonne Teisseire |
Privacy preserving sequential pattern mining in distributed databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIKM ![In: Proceedings of the 2006 ACM CIKM International Conference on Information and Knowledge Management, Arlington, Virginia, USA, November 6-11, 2006, pp. 758-767, 2006, ACM, 1-59593-433-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
privacy mining |
36 | Kirstie Hawkey, Kori M. Inkpen |
Examining the content and privacy of web browsing incidental information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW ![In: Proceedings of the 15th international conference on World Wide Web, WWW 2006, Edinburgh, Scotland, UK, May 23-26, 2006, pp. 123-132, 2006, ACM, 1-59593-323-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
client-side logging, web browsing behaviour, web page content, privacy, personalization, field study, ad hoc collaboration |
36 | Carina Paine, Adam N. Joinson, Tom Buchanan 0001, Ulf-Dietrich Reips |
Privacy and self-disclosure online. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI Extended Abstracts ![In: Extended Abstracts Proceedings of the 2006 Conference on Human Factors in Computing Systems, CHI 2006, Montréal, Québec, Canada, April 22-27, 2006, pp. 1187-1192, 2006, ACM, 978-1-59593-298-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
survey methodology, privacy, self-disclosure |
36 | Xiangdong An 0001, Dawn N. Jutla, Nick Cercone |
Privacy intrusion detection using dynamic Bayesian networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEC ![In: Proceedings of the 8th International Conference on Electronic Commerce: The new e-commerce - Innovations for Conquering Current Barriers, Obstacles and Limitations to Conducting Successful Business on the Internet, 2006, Fredericton, New Brunswick, Canada, August 13-16, 2006, pp. 208-215, 2006, ACM, 1-59593-392-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
privacy intrusion, intrusion detection, dynamic bayesian networks, probabilistic reasoning |
36 | Kathy S. Schwaig, Gerald C. Kane, Veda C. Storey |
Privacy, fair information practices and the fortune 500: the virtual reality of compliance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Base ![In: Data Base 36(1), pp. 49-63, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
internet, electronic commerce, information privacy, web surveys |
36 | Patrick C. K. Hung, Dickson K. W. Chiu, W. W. Fung, William K. Cheung 0001, Raymond K. Wong 0001, Samuel P. M. Choi, Eleanna Kafeza, James T. Kwok, Joshua C. C. Pun, Vivying S. Y. Cheng |
Towards end-to-end privacy control in the outsourcing of marketing activities: a web service integration solution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEC ![In: Proceedings of the 7th International Conference on Electronic Commerce, ICEC 2005, Xi'an, China, August 15-17, 2005, pp. 454-461, 2005, ACM, 1-59593-112-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Web service integration, need-to-know principle, OWL, SOAP, WSDL, privacy policies, UDDI, EPAL |
36 | Kun Peng, Ed Dawson, Juanma González Nieto, Eiji Okamoto, Javier López 0001 |
A Novel Method to Maintain Privacy in Mobile Agent Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 4th International Conference, CANS 2005, Xiamen, China, December 14-16, 2005, Proceedings, pp. 247-260, 2005, Springer, 3-540-30849-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
DCSC, privacy, Mobile agent, secure computation |
36 | Scott Lederer, Jason I. Hong, Anind K. Dey, James A. Landay |
Personal privacy through understanding and action: five pitfalls for designers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Pers. Ubiquitous Comput. ![In: Pers. Ubiquitous Comput. 8(6), pp. 440-454, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Privacy, Ubiquitous computing, Interaction design, Design guidelines |
36 | Patrick C. K. Hung, Elena Ferrari, Barbara Carminati |
Towards Standardized Web Services Privacy Technologies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICWS ![In: Proceedings of the IEEE International Conference on Web Services (ICWS'04), June 6-9, 2004, San Diego, California, USA, pp. 174-, 2004, IEEE Computer Society, 0-7695-2167-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Web services, SOAP, WSDL, WS-Security, privacy policies, P3P, UDDI, EPAL |
36 | Yi Xia, Yirong Yang, Yun Chi |
Mining association rules with non-uniform privacy concerns. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DMKD ![In: Proceedings of the 9th ACM SIGMOD Workshop on Research Issues in Data Mining and Knowledge Discovery, DMKD 2004, Paris, France, June 13, 2004, pp. 27-34, 2004, ACM, 1-58113-908-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
data mining, privacy, randomization |
36 | Victoria W. Romney, Gordon W. Romney |
Neglect of information privacy instruction: a case of educational malpractice? ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGITE Conference ![In: Proceedings of the 5th Conference on Information Technology Education, SIGITE 2004, 2004, Salt Lake City, UT, USA, October 28-30, 2004, pp. 79-82, 2004, ACM, 1-58113-936-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
European union directive, Gramm-Leach-Bliley, database design, IT education, data privacy, legislation, HIPAA, legal issues |
36 | Leysia Palen, Paul Dourish |
Unpacking "privacy" for a networked world. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI ![In: Proceedings of the 2003 Conference on Human Factors in Computing Systems, CHI 2003, Ft. Lauderdale, Florida, USA, April 5-10, 2003, pp. 129-136, 2003, ACM, 1-58113-630-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
access regulation, boundary management, data monitoring, privacy, surveillance, disclosure, social psychology |
36 | Julia Brande Earp, Fay Cobb Payton |
Data Protection in the University Setting: Employee Perceptions of Student Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 34th Annual Hawaii International Conference on System Sciences (HICSS-34), January 3-6, 2001, Maui, Hawaii, USA, 2001, IEEE Computer Society, 0-7695-0981-9. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Privacy, Data Collection, Factor Analysis, University |
36 | Ueli M. Maurer, Stefan Wolf 0001 |
Privacy Amplification Secure Against Active Adversaries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '97, 17th Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 1997, Proceedings, pp. 307-321, 1997, Springer, 3-540-63384-7. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
Unconditional secrecy, Information theory, Extractors, Privacy amplification, Authentication codes, Secret-key agreement |
36 | Agusti Solanas, Antoni Martínez-Ballesté |
Privacy Protection in Location-Based Services Through a Public-Key Privacy Homomorphism. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, 4th European PKI Workshop: Theory and Practice, EuroPKI 2007, Palma de Mallorca, Spain, June 28-30, 2007, Proceedings, pp. 362-368, 2007, Springer, 978-3-540-73407-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
public-key privacy homomorphism, location privacy |
36 | Thomas Neubauer, Andreas Ekelhart |
An evaluation of technologies for the pseudonymization of medical data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), Honolulu, Hawaii, USA, March 9-12, 2009, pp. 857-858, 2009, ACM, 978-1-60558-166-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
security, privacy, e-health, pseudonymization |
36 | Travis Kriplean, Evan Welbourne, Nodira Khoussainova, Vibhor Rastogi, Magdalena Balazinska, Gaetano Borriello, Tadayoshi Kohno, Dan Suciu |
Physical Access Control for Captured RFID Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Pervasive Comput. ![In: IEEE Pervasive Comput. 6(4), pp. 48-55, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
security, privacy, pervasive computing, RFID, data management |
36 | Serge Egelman, Lorrie Faith Cranor, Abdur Chowdhury |
An analysis of P3P-enabled web sites among top-20 search results. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEC ![In: Proceedings of the 8th International Conference on Electronic Commerce: The new e-commerce - Innovations for Conquering Current Barriers, Obstacles and Limitations to Conducting Successful Business on the Internet, 2006, Fredericton, New Brunswick, Canada, August 13-16, 2006, pp. 197-207, 2006, ACM, 1-59593-392-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
e-commerce, search engines, privacy policies, P3P |
35 | Mangesh Gupte, Mukund Sundararajan |
Universally optimal privacy mechanisms for minimax agents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PODS ![In: Proceedings of the Twenty-Ninth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, PODS 2010, June 6-11, 2010, Indianapolis, Indiana, USA, pp. 135-146, 2010, ACM, 978-1-4503-0033-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
universally optimal privacy, decision theory, linear algebra, differential privacy, minimax |
35 | Sameer Patil, Alfred Kobsa, Ajita John, Lynne Shapiro Brotman, Dorée D. Seligmann |
Interpersonal Privacy Management in Distributed Collaboration: Situational Characteristics and Interpretive Influences. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTERACT (2) ![In: Human-Computer Interaction - INTERACT 2009, 12th IFIP TC 13 International Conference, Uppsala, Sweden, August 24-28, 2009, Proceedings, Part II, pp. 143-156, 2009, Springer, 978-3-642-03657-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Privacy, Awareness, Distributed collaboration, Privacy management |
35 | Ashwin Machanavajjhala, Daniel Kifer, Johannes Gehrke, Muthuramakrishnan Venkitasubramaniam |
L-diversity: Privacy beyond k-anonymity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Knowl. Discov. Data ![In: ACM Trans. Knowl. Discov. Data 1(1), pp. 3, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
?-diversity, privacy-preserving data publishing, k-anonymity, Data privacy |
35 | Rainer Böhme, Sven Koble |
Pricing strategies in electronic marketplaces with privacy-enhancing technologies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wirtschaftsinf. ![In: Wirtschaftsinf. 49(1), pp. 16-25, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Economics of Privacy, E-Commerce, Identity Management, Privacy-Enhancing Technologies, Price Discrimination |
35 | Liang Zhang |
A self-adjusting directed random walk approach for enhancing source-location privacy in sensor network routing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWCMC ![In: Proceedings of the International Conference on Wireless Communications and Mobile Computing, IWCMC 2006, Vancouver, British Columbia, Canada, July 3-6, 2006, pp. 33-38, 2006, ACM, 1-59593-306-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
sensor networks privacy, source-location privacy |
35 | Hsu-Hui Lee, Mark Stamp 0001 |
P3P privacy enhancing agent. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SWS ![In: Proceedings of the 3rd ACM Workshop On Secure Web Services, SWS 2006, Alexandria, VA, USA, November 3, 2006, pp. 109-110, 2006, ACM, 1-59593-546-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
personal identifiable information (PII), platform for privacy preference (P3P), ontology, privacy, software agent |
35 | Bobi Gilburd, Assaf Schuster, Ran Wolff 0001 |
k-TTP: a new privacy model for large-scale distributed environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KDD ![In: Proceedings of the Tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Seattle, Washington, USA, August 22-25, 2004, pp. 563-568, 2004, ACM, 1-58113-888-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
security, data mining, privacy, association rule mining, privacy-preserving data mining, distributed data mining |
35 | Braden Kowitz, Lorrie Faith Cranor |
Peripheral privacy notifications for wireless networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WPES ![In: Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, WPES 2005, Alexandria, VA, USA, November 7, 2005, pp. 90-96, 2005, ACM, 1-59593-228-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
electronic communication privacy, privacy, wireless network, peripheral display, privacy enhancing technologies |
35 | Raghav Bhaskar, Srivatsan Laxman, Adam D. Smith, Abhradeep Thakurta |
Discovering frequent patterns in sensitive data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KDD ![In: Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Washington, DC, USA, July 25-28, 2010, pp. 503-512, 2010, ACM, 978-1-4503-0055-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
exponential mechanism, privacy, frequent itemsets, frequent patterns, differential privacy |
35 | Shiva Prasad Kasiviswanathan, Mark Rudelson, Adam D. Smith, Jonathan R. Ullman |
The price of privately releasing contingency tables and the spectra of random matrices with correlated rows. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STOC ![In: Proceedings of the 42nd ACM Symposium on Theory of Computing, STOC 2010, Cambridge, Massachusetts, USA, 5-8 June 2010, pp. 775-784, 2010, ACM, 978-1-4503-0050-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
reconstruction attacks, data privacy, differential privacy, random matrices |
35 | Xiao Pan, Xiaofeng Meng 0001, Jianliang Xu |
Distortion-based anonymity for continuous queries in location-based mobile services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GIS ![In: 17th ACM SIGSPATIAL International Symposium on Advances in Geographic Information Systems, ACM-GIS 2009, November 4-6, 2009, Seattle, Washington, USA, Proceedings, pp. 256-265, 2009, ACM, 978-1-60558-649-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
location-based services, continuous queries, privacy protection, information privacy |
35 | Francesco Bonchi |
Privacy Preserving Publication of Moving Object Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy in Location-Based Applications ![In: Privacy in Location-Based Applications, Research Issues and Emerging Trends [This book was partially born out of the First International Workshop on Privacy in Location-Based Applications (PiLBA 2008) held in Malaga, Spain, in October 2008, in conjunction with the 13th European Symposium on Research in Computer Security]., pp. 190-215, 2009, Springer, 978-3-642-03510-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
35 | Quynh Chi Truong, Anh Tuan Truong, Tran Khanh Dang |
Privacy preserving through a memorizing algorithm in location-based services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MoMM ![In: MoMM'2009 - The 7th International Conference on Advances in Mobile Computing and Multimedia, 14-16 December 2009, Kuala Lumpur, Malaysia, pp. 146-153, 2009, ACM, 978-1-60558-659-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
memorizing algorithm, privacy preserving in data mining, location-based services, privacy preserving, location privacy, legal aspects |
35 | Colin Birge |
Enhancing research into usable privacy and security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGDOC ![In: Proceedings of the 27th Annual International Conference on Design of Communication, SIGDOC 2009, Bloomington, Indiana, USA, October 5-7, 2009, pp. 221-226, 2009, ACM, 978-1-60558-559-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
trust user experience, user-centered security, privacy, trust, usable security, privacy policies, usable privacy and security |
34 | Kamil Reddy, H. S. Venter, Martin S. Olivier, Iain Currie |
Towards Privacy Taxonomy-Based Attack Tree Analysis for the Protection of Consumer Information Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Sixth Annual Conference on Privacy, Security and Trust, PST 2008, October 1-3, 2008, Fredericton, New Brunswick, Canada, pp. 56-64, 2008, IEEE Computer Society, 978-0-7695-3390-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
34 | Zekeriya Erkin, Martin Franz, Jorge Guajardo, Stefan Katzenbeisser 0001, Inald Lagendijk, Tomas Toft |
Privacy-Preserving Face Recognition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy Enhancing Technologies ![In: Privacy Enhancing Technologies, 9th International Symposium, PETS 2009, Seattle, WA, USA, August 5-7, 2009. Proceedings, pp. 235-253, 2009, Springer, 978-3-642-03167-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
34 | Emiliano De Cristofaro, Stanislaw Jarecki, Jihye Kim, Gene Tsudik |
Privacy-Preserving Policy-Based Information Transfer. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy Enhancing Technologies ![In: Privacy Enhancing Technologies, 9th International Symposium, PETS 2009, Seattle, WA, USA, August 5-7, 2009. Proceedings, pp. 164-184, 2009, Springer, 978-3-642-03167-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
34 | John M. Abowd, Lars Vilhuber |
How Protective Are Synthetic Data?. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy in Statistical Databases ![In: Privacy in Statistical Databases, UNESCO Chair in Data Privacy International Conference, PSD 2008, Istanbul, Turkey, September 24-26, 2008. Proceedings, pp. 239-246, 2008, Springer, 978-3-540-87470-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
34 | Thomas S. Heydt-Benjamin, Hee-Jin Chae, Benessa Defend, Kevin Fu |
Privacy for Public Transportation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy Enhancing Technologies ![In: Privacy Enhancing Technologies, 6th International Workshop, PET 2006, Cambridge, UK, June 28-30, 2006, Revised Selected Papers, pp. 1-19, 2006, Springer, 3-540-68790-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
34 | Katrin Borcea, Hilko Donker, Elke Franz 0001, Andreas Pfitzmann, Hagen Wahrig |
Towards Privacy-Aware eLearning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy Enhancing Technologies ![In: Privacy Enhancing Technologies, 5th International Workshop, PET 2005, Cavtat, Croatia, May 30-June 1, 2005, Revised Selected Papers, pp. 167-178, 2005, Springer, 3-540-34745-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
34 | Ari Juels, Paul F. Syverson, Daniel V. Bailey |
High-Power Proxies for Enhancing RFID Privacy and Utility. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy Enhancing Technologies ![In: Privacy Enhancing Technologies, 5th International Workshop, PET 2005, Cavtat, Croatia, May 30-June 1, 2005, Revised Selected Papers, pp. 210-226, 2005, Springer, 3-540-34745-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
34 | Katia Hayati, Martín Abadi |
Language-Based Enforcement of Privacy Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy Enhancing Technologies ![In: Privacy Enhancing Technologies, 4th International Workshop, PET 2004, Toronto, Canada, May 26-28, 2004, Revised Selected Papers, pp. 302-313, 2004, Springer, 3-540-26203-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
34 | Jonathan T. Trostle, Hosei Matsuoka, Muhammad Mukarram Bin Tariq, James Kempf, Toshiro Kawahara, Ravi Jain |
Cryptographically Protected Prefixes for Location Privacy in IPv6. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy Enhancing Technologies ![In: Privacy Enhancing Technologies, 4th International Workshop, PET 2004, Toronto, Canada, May 26-28, 2004, Revised Selected Papers, pp. 142-166, 2004, Springer, 3-540-26203-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
34 | Patricia Beatty, Ian Reay, Scott Dick, James Miller 0001 |
P3P Adoption on E-Commerce Web sites: A Survey and Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Internet Comput. ![In: IEEE Internet Comput. 11(2), pp. 65-71, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Privacy Preferences Project, privacy, e-commerce, P3P, PETs, privacy-enhancing technologies |
Displaying result #201 - #300 of 63336 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ >>] |
|