|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 11410 occurrences of 3224 keywords
|
|
|
Results
Found 63337 publication records. Showing 63336 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
32 | William Yurcik, Clay Woolam, Greg Hellings, Latifur Khan, Bhavani Thuraisingham |
Privacy/Analysis Tradeoffs in Sharing Anonymized Packet Traces: Single-Field Case. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Third International Conference on Availability, Reliability and Security, ARES 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain, pp. 237-244, 2008, IEEE Computer Society, 978-0-7695-3102-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
privacy-enhanced security data sharing |
32 | Mahmoud Hussein, Ashraf El-Sisi, Nabil A. Ismail |
Fast Cryptographic Privacy Preserving Association Rules Mining on Distributed Homogenous Data Base. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES (2) ![In: Knowledge-Based Intelligent Information and Engineering Systems, 12th International Conference, KES 2008, Zagreb, Croatia, September 3-5, 2008, Proceedings, Part II, pp. 607-616, 2008, Springer, 978-3-540-85564-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
security, privacy, cryptography, association rule mining, distributed data mining, apriori |
32 | Khalil El-Khatib |
The cost of protecting privacy in multimedia applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Q2SWinet ![In: Q2SWinet'08 - Proceedings of the 4th ACM Workshop on Q2S and Security for Wireless and Mobile Networks, Vancouver, British Columbia, Canada, October 27-28, 2008, pp. 51-54, 2008, ACM, 978-1-60558-237-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
oblivious polynomial evaluation, user's satisfaction, Quality of Service, privacy, multimedia, complexity, negotiation, multimedia application, user preferences, oblivious transfer |
32 | Yi Ouyang 0001, Yurong Xu, Zhengyi Le, Guanling Chen, Fillia Makedon |
Providing location privacy in assisted living environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PETRA ![In: Proceedings of the 1st ACM International Conference on Pervasive Technologies Related to Assistive Environments, PETRA 2008, Athens, Greece, July 16-18, 2008, pp. 39, 2008, ACM, 978-1-60558-067-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
sensor networks, algorithms, location privacy |
32 | Athanasios N. Yannacopoulos, Costas Lambrinoudakis, Stefanos Gritzalis, Stylianos Z. Xanthopoulos, Sokratis K. Katsikas |
Modeling Privacy Insurance Contracts and Their Utilization in Risk Management for ICT Firms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2008, 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings, pp. 207-222, 2008, Springer, 978-3-540-88312-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Random Utility Models, Privacy, Risk Modeling, Insurance |
32 | Kim-Phuong L. Vu, Vanessa Chambers, Fredrick P. Garcia, Beth Creekmur, John Sulaitis, Deborah Nelson, Russell Pierce, Robert W. Proctor |
How Users Read and Comprehend Privacy Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HCI (9) ![In: Human Interface and the Management of Information. Interacting in Information Environments, Symposium on Human Interface 2007, Held as Part of HCI International 2007, Beijing, China, July 22-27, 2007, Proceedings, Part II, pp. 802-811, 2007, Springer, 978-3-540-73353-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
usability, eye-tracking, privacy policies, reading comprehension |
32 | Luca Compagna, Paul El Khoury, Fabio Massacci, Reshma Thomas, Nicola Zannone |
How to capture, model, and verify the knowledge of legal, security, and privacy experts: a pattern-based approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICAIL ![In: The Eleventh International Conference on Artificial Intelligence and Law, Proceedings of the Conference, June 4-8, 2007, Stanford Law School, Stanford, California, USA, pp. 149-153, 2007, ACM, 978-1-59593-680-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
legal requirements, pattern validation, security & privacy patterns, organization, health care |
32 | Qun Ni, Alberto Trombetta, Elisa Bertino, Jorge Lobo 0001 |
Privacy-aware role based access control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 12th ACM Symposium on Access Control Models and Technologies, SACMAT 2007, Sophia Antipolis, France, June 20-22, 2007, Proceedings, pp. 41-50, 2007, ACM, 978-1-59593-745-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
model, privacy, role based access control, purpose |
32 | Changjin Lee, Bong Gyou Lee, Youngil Kong |
Privacy Protection for a Secure u-City Life. ![Search on Bibsonomy](Pics/bibsonomy.png) |
International Conference on Computational Science (4) ![In: Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27 - 30, 2007, Proceedings, Part IV, pp. 685-692, 2007, Springer, 978-3-540-72589-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Ubiquitous Computing, Privacy Protection, Personal Information, u-City |
32 | Richard Cissée, Sahin Albayrak |
An agent-based approach for privacy-preserving recommender systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAMAS ![In: 6th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2007), Honolulu, Hawaii, USA, May 14-18, 2007, pp. 182, 2007, IFAAMAS, 978-81-904262-7-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
privacy, trust, recommender systems, multiagent systems, information filtering |
32 | Kun Liu 0001, Hillol Kargupta, Jessica Ryan |
Random Projection-Based Multiplicative Data Perturbation for Privacy Preserving Distributed Data Mining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Knowl. Data Eng. ![In: IEEE Trans. Knowl. Data Eng. 18(1), pp. 92-106, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
multiplicative data perturbation, privacy preserving data mining, Random projection |
32 | Monica Tentori, Jesús Favela, Marcela D. Rodríguez |
Privacy-Aware Autonomous Agents for Pervasive Healthcare. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Intell. Syst. ![In: IEEE Intell. Syst. 21(6), pp. 55-62, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
privacy-aware computing, pervasive computing, autonomous agents, healthcare applications |
32 | Anna Cinzia Squicciarini, Elisa Bertino, Elena Ferrari, Indrakshi Ray |
Achieving Privacy in Trust Negotiations with an Ontology-Based Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 3(1), pp. 13-30, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
ontology, Privacy, trust negotiations |
32 | Nina Mishra, Mark Sandler 0002 |
Privacy via pseudorandom sketches. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PODS ![In: Proceedings of the Twenty-Fifth ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, June 26-28, 2006, Chicago, Illinois, USA, pp. 143-152, 2006, ACM, 1-59593-318-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
input perturbation schemes, privacy, data reconstruction |
32 | Alfred Kobsa, Ramnath K. Chellappa, Sarah Spiekermann |
Privacy-enhanced personalization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI Extended Abstracts ![In: Extended Abstracts Proceedings of the 2006 Conference on Human Factors in Computing Systems, CHI 2006, Montréal, Québec, Canada, April 22-27, 2006, pp. 1631-1634, 2006, ACM, 978-1-59593-298-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
privacy, personalization, e-commerce, user modeling, user profiling, personal data |
32 | Tao Yu, Yue Zhang 0001, Kwei-Jay Lin |
Modeling and Measuring Privacy Risks in QoS Web Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CEC/EEE ![In: Eighth IEEE International Conference on E-Commerce Technology (CEC 2006) / Third IEEE International Conference on Enterprise Computing, E-Commerce and E-Services (EEE 2006) and Workshops, 26-29 June 2006, Palo Alto, California, USA, pp. 4, 2006, IEEE Computer Society, 0-7695-2511-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
QoS, Web Service, privacy, service selection, utility function |
32 | Sameer Patil, Alfred Kobsa |
Uncovering privacy attitudes and practices in instant messaging. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GROUP ![In: Proceedings of the 2005 International ACM SIGGROUP Conference on Supporting Group Work, GROUP 2005, Sanibel Island, Florida, USA, November 6-9, 2005, pp. 109-112, 2005, ACM, 1-59593-223-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
privacy, CMC, computer-mediated communication, instant messaging, chat, IM |
32 | John Sören Pettersson, Simone Fischer-Hübner, Ninni Danielsson, Jenny Nilsson, Mike Bergmann, Sebastian Clauß, Thomas Kriegelstein, Henry Krasemann |
Making PRIME usable. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOUPS ![In: Proceedings of the 1st Symposium on Usable Privacy and Security, SOUPS 2005, Pittsburgh, Pennsylvania, USA, July 6-8, 2005, pp. 53-64, 2005, ACM, 1-59593-178-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
HCI, identity management, privacy-enhancing technologies |
32 | Michael Backes 0001, Günter Karjoth, Walid Bagga, Matthias Schunter |
Efficient comparison of enterprise privacy policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2004 ACM Symposium on Applied Computing (SAC), Nicosia, Cyprus, March 14-17, 2004, pp. 375-382, 2004, ACM, 1-58113-812-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
policy comparison, privacy policy |
32 | Michael Yu Zhu, Lei Liu |
Optimal randomization for privacy preserving data mining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KDD ![In: Proceedings of the Tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Seattle, Washington, USA, August 22-25, 2004, pp. 761-766, 2004, ACM, 1-58113-888-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
individual privacy, randomization operator, mixture model |
32 | Rebecca N. Wright, Zhiqiang Yang |
Privacy-preserving Bayesian network structure computation on distributed heterogeneous data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KDD ![In: Proceedings of the Tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Seattle, Washington, USA, August 22-25, 2004, pp. 713-718, 2004, ACM, 1-58113-888-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Bayesian network, distributed databases, privacy-preserving data mining |
32 | Jehan Wickramasuriya, Mahesh Datt, Sharad Mehrotra, Nalini Venkatasubramanian |
Privacy protecting data collection in media spaces. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Multimedia ![In: Proceedings of the 12th ACM International Conference on Multimedia, New York, NY, USA, October 10-16, 2004, pp. 48-55, 2004, ACM, 1-58113-893-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
privacy, access control, video surveillance |
32 | Harry Hochheiser |
The platform for privacy preference as a social protocol: An examination within the U.S. policy context. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Internet Techn. ![In: ACM Trans. Internet Techn. 2(4), pp. 276-306, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
social protocols, Privacy, P3P |
32 | Anne Adams, Martina Angela Sasse |
Taming the wolf in sheep's clothing: privacy in multimedia communications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Multimedia (1) ![In: Proceedings of the 7th ACM International Conference on Multimedia '99, Orlando, FL, USA, October 30 - November 5, 1999, Part 1., pp. 101-107, 1999, ACM, 1-58113-151-8. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
privacy, trust, multicasting, multimedia communications, grounded theory |
32 | Anja Becker 0001, Alapan Arnab, Mercè Serra |
Assessing privacy criteria for drm using eu privacy legislation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Rights Management Workshop ![In: Proceedings of the 8th ACM Workshop on Digital Rights Management, Alexandria, VA, USA, October 27, 2008, pp. 77-86, 2008, ACM, 978-1-60558-290-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
oma drm, privacy legislation, privacy seals |
32 | Frank Stajano, Lucia Bianchi, Pietro Liò, Douwe Korff |
Forensic genomics: kin privacy, driftnets and other open questions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WPES ![In: Proceedings of the 2008 ACM Workshop on Privacy in the Electronic Society, WPES 2008, Alexandria, VA, USA, October 27, 2008, pp. 15-22, 2008, ACM, 978-1-60558-289-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
cold and hot hits, dna database, forensic genomics, human genome project, kin privacy, data protection, informational privacy |
32 | Ryan Henry, Ian Goldberg |
Formalizing Anonymous Blacklisting Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Symposium on Security and Privacy ![In: 32nd IEEE Symposium on Security and Privacy, SP 2011, 22-25 May 2011, Berkeley, California, USA, pp. 81-95, 2011, IEEE Computer Society, 978-1-4577-0147-4. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
anonymous blacklisting, privacy-enhanced revocation, authentication, anonymity, privacy enhancing technologies |
32 | Ryan Henry, Ian Goldberg |
Extending Nymble-like Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Symposium on Security and Privacy ![In: 32nd IEEE Symposium on Security and Privacy, SP 2011, 22-25 May 2011, Berkeley, California, USA, pp. 523-537, 2011, IEEE Computer Society, 978-1-4577-0147-4. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
anonymous blacklisting, privacy-enhanced revocation, authentication, anonymity, privacy enhancing technologies |
32 | Chih-Cheng Chang, Brian Thompson, Wendy Hui Wang, Danfeng Yao |
Towards publishing recommendation data with predictive anonymization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2010, Beijing, China, April 13-16, 2010, pp. 24-35, 2010, ACM, 978-1-60558-936-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
clustering, privacy, prediction, anonymization, sparsity |
32 | Shenoda Guirguis, Alok Pareek |
BronzeGate: real-time transactional data obfuscation for GoldenGate. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EDBT ![In: EDBT 2010, 13th International Conference on Extending Database Technology, Lausanne, Switzerland, March 22-26, 2010, Proceedings, pp. 645-650, 2010, ACM, 978-1-60558-945-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
data obfuscation, real-time transactional data management, security, privacy, usability, masking |
32 | Shyue-Liang Wang, Dipen Patel, Ayat Jafari, Tzung-Pei Hong |
Hiding collaborative recommendation association rules. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Appl. Intell. ![In: Appl. Intell. 27(1), pp. 67-77, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Association rule, Privacy preserving data mining, Collaborative recommendation |
32 | Maryam Najafian Razavi, Lee Iverson |
A grounded theory of information sharing behavior in a personal learning space. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSCW ![In: Proceedings of the 2006 ACM Conference on Computer Supported Cooperative Work, CSCW 2006, Banff, Alberta, Canada, November 4-8, 2006, pp. 459-468, 2006, ACM, 1-59593-249-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
user modeling, information sharing, weblog, grounded theory, information privacy, ePortfolio |
32 | Gildas Avoine, Philippe Oechslin |
RFID Traceability: A Multilayer Problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security, 9th International Conference, FC 2005, Roseau, The Commonwealth of Dominica, February 28 - March 3, 2005, Revised Papers, pp. 125-140, 2005, Springer, 3-540-26656-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Privacy, RFID, Collision Avoidance, Communication Model |
32 | Eiji Okamoto, Takeshi Okamoto |
Cryptosystems Based on Elliptic Curve Pairing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MDAI ![In: Modeling Decisions for Artificial Intelligence, Second International Conference, MDAI 2005, Tsukuba, Japan, July 25-27, 2005, Proceedings, pp. 13-23, 2005, Springer, 3-540-27871-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
key agreement scheme, privacy, pairing, ID based cryptosystem |
32 | Cheng-De Qin |
Personal data protection in electronic business. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEC ![In: Proceedings of the 7th International Conference on Electronic Commerce, ICEC 2005, Xi'an, China, August 15-17, 2005, pp. 893-895, 2005, ACM, 1-59593-112-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
personal data protection, tort, privacy, legislation, electronic business |
32 | Yi-Ting Chiang, Da-Wei Wang 0004, Churn-Jung Liau, Tsan-sheng Hsu |
Secrecy of Two-Party Secure Computation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DBSec ![In: Data and Applications Security XIX, 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005, Proceedings, pp. 114-123, 2005, Springer, 3-540-28138-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Privacy Analysis, Scalar Product, Private Computation |
32 | Sastry Duri, Jeffrey Elliott, Marco Gruteser, Xuan Liu, Paul Moskowitz, Ronald Perez, Moninder Singh, Jung-Mu Tang |
Data Protection and Data Sharing in Telematics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mob. Networks Appl. ![In: Mob. Networks Appl. 9(6), pp. 693-701, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
data protection architecture, automotive telematics, privacy policies |
31 | Moritz Hardt, Kunal Talwar |
On the geometry of differential privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STOC ![In: Proceedings of the 42nd ACM Symposium on Theory of Computing, STOC 2010, Cambridge, Massachusetts, USA, 5-8 June 2010, pp. 705-714, 2010, ACM, 978-1-4503-0050-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
privacy, complexity, histogram, geometry, differential privacy, statistical data analysis |
31 | Maithili Narasimha, John Solis, Gene Tsudik |
Privacy-preserving revocation checking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 8(1), pp. 61-75, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Privacy-preserving revocation checking, Anonymity and privacy, Certificate revocation trees, Revocation, Certificate revocation lists |
31 | Yonnim Lee, Debashis Sarangi, Ohbyung Kwon, Minyong Kim |
Lattice Based Privacy Negotiation Rule Generation for Context-Aware Service. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UIC ![In: Ubiquitous Intelligence and Computing, 6th International Conference, UIC 2009, Brisbane, Australia, July 7-9, 2009. Proceedings, pp. 340-352, 2009, Springer, 978-3-642-02829-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Privacy negotiation, Privacy ontology, Lattice, P3P, Agent technology |
31 | Carsten Röcker, Steve Hinske, Carsten Magerkurth |
Intelligent Privacy Support for Large Public Displays. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HCI (6) ![In: Universal Access in Human-Computer Interaction. Ambient Interaction, 4th International Conference on Universal Access in Human-Computer Interaction, UAHCI 2007 Held as Part of HCI International 2007 Beijing, China, July 22-27, 2007 Proceedings, Part II, pp. 198-207, 2007, Springer, 978-3-540-73280-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Large Public Displays, Intelligent Privacy Support, Context-Adapted Information Representation, Evaluation, Smart Environments, Privacy-Enhancing Technologies |
31 | Hyun-A Park, Dong Hoon Lee 0001, Jongin Lim 0001, Sang Hyun Cho |
PPIDS: Privacy Preserving Intrusion Detection System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PAISI ![In: Intelligence and Security Informatics, Pacific Asia Workshop, PAISI 2007, Chengdu, China, April 11-12, 2007, Proceedings, pp. 269-274, 2007, Springer, 978-3-540-71548-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Host-based IDS, Privacy, Intrusion Detection System, Audit log, Privacy Homomorphism |
31 | Elke Franz 0001, Katja Liesebach, Katrin Borcea-Pfitzmann |
Privacy-aware user interfaces within collaborative environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CAI ![In: Proceedings of the 2006 AVI Workshop on Context in advanced interfaces, CAI 2006, Venice, Italy, May 23, 2006, pp. 45-48, 2006, ACM Press. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
partial identities, privacy-aware user interface, privacy-enhancing identity management, visualization, collaborative environments |
31 | Elaine M. Newton, Latanya Sweeney, Bradley A. Malin |
Preserving Privacy by De-Identifying Face Images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Knowl. Data Eng. ![In: IEEE Trans. Knowl. Data Eng. 17(2), pp. 232-243, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
privacy, Video surveillance, k-anonymity, privacy-preserving data mining |
31 | Alessandro Acquisti, Jens Grossklags |
Privacy and Rationality in Individual Decision Making. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 3(1), pp. 26-33, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
privacy decisions, personal information, bounded rationality, personal privacy |
31 | Nan Zhang 0004, Shengquan Wang, Wei Zhao 0001 |
A new scheme on privacy-preserving data classification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KDD ![In: Proceedings of the Eleventh ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Chicago, Illinois, USA, August 21-24, 2005, pp. 374-383, 2005, ACM, 1-59593-135-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
privacy, privacy-preserving data mining |
31 | Mark S. Ackerman |
Privacy in pervasive environments: next generation labeling protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Pers. Ubiquitous Comput. ![In: Pers. Ubiquitous Comput. 8(6), pp. 430-439, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Platform for privacy preferences, Labeling protocols, Privacy, Ubiquitous computing, P3P, Pervasive environments |
31 | Larry Korba |
Privacy in Distributed Electronic Commerce. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 35th Hawaii International Conference on System Sciences (HICSS-35 2002), CD-ROM / Abstracts Proceedings, 7-10 January 2002, Big Island, HI, USA, pp. 306, 2002, IEEE Computer Society, 0-7695-1435-9. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Privacy Law, Security, Privacy, Agent, Policy, Agent Negotiation |
31 | Sastry Duri, Marco Gruteser, Xuan Liu, Paul Moskowitz, Ronald Perez, Moninder Singh, Jung-Mu Tang |
Framework for security and privacy in automotive telematics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Workshop Mobile Commerce ![In: Proceedings of the 2nd International Workshop on Mobile Commerce, Atlanta, Georgia, USA, September 28, 2002, pp. 25-32, 2002, ACM, 1-58113-600-5. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
automotive telematics, security, privacy, privacy policies |
31 | Girma Nigusse, Bart De Decker |
conf/cse/NigusseDN09 conf/dbsec/VerslypeDNNLV08 Girma Nigusse = Girma Enideg Nigusse Privacy Codes of Practice for the Social Web: The Analysis of Existing Privacy Codes and Emerging Social-Centric Privacy Risks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAAI Spring Symposium: Intelligent Information Privacy Management ![In: Intelligent Information Privacy Management, Papers from the 2010 AAAI Spring Symposium, Technical Report SS-10-05, Stanford, California, USA, March 22-24, 2010, 2010, AAAI. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
31 | Vera Schmitt |
Influence of Privacy Knowledge on Privacy Attitudes in the Domain of Location-Based Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy and Identity Management ![In: Privacy and Identity Management - 17th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Privacy and Identity 2022, Virtual Event, August 30 - September 2, 2022, Proceedings, pp. 118-132, 2022, Springer, 978-3-031-31970-9. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
31 | Frank Ebbers |
How to Protect My Privacy? - Classifying End-User Information Privacy Protection Behaviors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy and Identity Management ![In: Privacy and Identity Management. Data for Better Living: AI and Privacy - 14th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Windisch, Switzerland, August 19-23, 2019, Revised Selected Papers, pp. 327-342, 2019, Springer, 978-3-030-42503-6. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
31 | Monika Taddicken, Cornelia Jers |
The Uses of Privacy Online: Trading a Loss of Privacy for Social Web Gratifications? ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy Online ![In: Privacy Online - Perspectives on Privacy and Self-Disclosure in the Social Web., pp. 143-156, 2011, Springer, 978-3-642-21520-9. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
31 | Zizi Papacharissi, Paige L. Gibson |
Fifteen Minutes of Privacy: Privacy, Sociality, and Publicity on Social Network Sites. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy Online ![In: Privacy Online - Perspectives on Privacy and Self-Disclosure in the Social Web., pp. 75-89, 2011, Springer, 978-3-642-21520-9. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
31 | Krishnamurty Muralidhar, Rathindra Sarathy |
Does Differential Privacy Protect Terry Gross' Privacy? ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy in Statistical Databases ![In: Privacy in Statistical Databases - UNESCO Chair in Data Privacy, International Conference, PSD 2010, Corfu, Greece, September 22-24, 2010. Proceedings, pp. 200-209, 2010, Springer, 978-3-642-15837-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
31 | Mark S. Ackerman, Lorrie Faith Cranor, Joseph Reagle |
Privacy in e-commerce: examining user scenarios and privacy preferences. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EC ![In: Proceedings of the First ACM Conference on Electronic Commerce (EC-99), Denver, CO, USA, November 3-5, 1999, pp. 1-8, 1999, ACM, 1-58113-176-3. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Platform for Privacy Preferences, privacy protocols, privacy, World Wide Web, electronic commerce, user survey |
31 | Murat Kantarcioglu, Wei Jiang, Bradley A. Malin |
A Privacy-Preserving Framework for Integrating Person-Specific Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy in Statistical Databases ![In: Privacy in Statistical Databases, UNESCO Chair in Data Privacy International Conference, PSD 2008, Istanbul, Turkey, September 24-26, 2008. Proceedings, pp. 298-314, 2008, Springer, 978-3-540-87470-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
31 | Dmitri Asonov, Johann Christoph Freytag |
Repudiative information retrieval. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WPES ![In: Proceedings of the 2002 ACM Workshop on Privacy in the Electronic Society, WPES 2002, Washington, DC, USA, November 21, 2002, pp. 32-40, 2002, ACM, 1-58113-633-1. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
privacy and anonymity in Web transactions, privacy in the digital business, privacy enhancing technologies |
30 | Justin Samuel, Beichuan Zhang 0001 |
RequestPolicy: Increasing Web Browsing Privacy through Control of Cross-Site Requests. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy Enhancing Technologies ![In: Privacy Enhancing Technologies, 9th International Symposium, PETS 2009, Seattle, WA, USA, August 5-7, 2009. Proceedings, pp. 128-142, 2009, Springer, 978-3-642-03167-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
30 | Francesco Bonchi, Yücel Saygin, Vassilios S. Verykios, Maurizio Atzori, Aris Gkoulalas-Divanis, Selim Volkan Kaya, Erkay Savas |
Privacy in Spatiotemporal Data Mining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mobility, Data Mining and Privacy ![In: Mobility, Data Mining and Privacy - Geographic Knowledge Discovery, pp. 297-333, 2008, Springer, 978-3-540-75176-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
30 | Jordi Nin, Javier Herranz, Vicenç Torra |
Towards a More Realistic Disclosure Risk Assessment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy in Statistical Databases ![In: Privacy in Statistical Databases, UNESCO Chair in Data Privacy International Conference, PSD 2008, Istanbul, Turkey, September 24-26, 2008. Proceedings, pp. 152-165, 2008, Springer, 978-3-540-87470-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
30 | Reynold Cheng, Yu Zhang, Elisa Bertino, Sunil Prabhakar |
Preserving User Location Privacy in Mobile Data Management Infrastructures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy Enhancing Technologies ![In: Privacy Enhancing Technologies, 6th International Workshop, PET 2006, Cambridge, UK, June 28-30, 2006, Revised Selected Papers, pp. 393-412, 2006, Springer, 3-540-68790-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
30 | Geir M. Køien, Vladimir A. Oleshchuk |
Location Privacy for Cellular Systems; Analysis and Solution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy Enhancing Technologies ![In: Privacy Enhancing Technologies, 5th International Workshop, PET 2005, Cavtat, Croatia, May 30-June 1, 2005, Revised Selected Papers, pp. 40-58, 2005, Springer, 3-540-34745-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
30 | Kent E. Seamons, Marianne Winslett, Ting Yu 0001, Lina Yu, Ryan Jarvis |
Protecting Privacy during On-Line Trust Negotiation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy Enhancing Technologies ![In: Privacy Enhancing Technologies, Second International Workshop, PET 2002, San Francisco, CA, USA, April 14-15, 2002, Revised Papers, pp. 129-143, 2002, Springer, 3-540-00565-X. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
30 | Péter Dornbach, Zoltán Németh |
Privacy Enhancing Profile Disclosure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy Enhancing Technologies ![In: Privacy Enhancing Technologies, Second International Workshop, PET 2002, San Francisco, CA, USA, April 14-15, 2002, Revised Papers, pp. 85-98, 2002, Springer, 3-540-00565-X. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
30 | Tero Alamäki, Margareta Björksten, Péter Dornbach, Casper Gripenberg, Norbert Gyorbíró, Gábor Márton, Zoltán Németh, Timo Skyttä, Mikko Tarkiainen |
Privacy Enhancing Service Architectures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy Enhancing Technologies ![In: Privacy Enhancing Technologies, Second International Workshop, PET 2002, San Francisco, CA, USA, April 14-15, 2002, Revised Papers, pp. 99-109, 2002, Springer, 3-540-00565-X. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
30 | Ian Goldberg |
Privacy-Enhancing Technologies for the Internet, II: Five Years Later. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy Enhancing Technologies ![In: Privacy Enhancing Technologies, Second International Workshop, PET 2002, San Francisco, CA, USA, April 14-15, 2002, Revised Papers, pp. 1-12, 2002, Springer, 3-540-00565-X. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
30 | Adil Alsaid, David M. Martin Jr. |
Detecting Web Bugs with Bugnosis: Privacy Advocacy through Education. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy Enhancing Technologies ![In: Privacy Enhancing Technologies, Second International Workshop, PET 2002, San Francisco, CA, USA, April 14-15, 2002, Revised Papers, pp. 13-26, 2002, Springer, 3-540-00565-X. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
30 | Simon D. Byers, Lorrie Faith Cranor, David P. Kormann |
Automated analysis of P3P-enabled Web sites. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEC ![In: Proceedings of the 5th International Conference on Electronic Commerce, ICEC 2003, Pittsburgh, Pennsylvania, USA, September 30 - October 03, 2003, pp. 326-338, 2003, ACM, 1-58113-788-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
platform for privacy preferences, privacy, privacy policy, P3P |
30 | Nick Doty, Erik Wilde |
Geolocation privacy and application platforms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SPRINGL ![In: Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS, SPRINGL 2010, November 2, 2010, San Jose, California, USA, Proceedings, pp. 65-69, 2010, ACM. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
30 | Hua Lu 0001, Christian S. Jensen, Man Lung Yiu |
PAD: privacy-area aware, dummy-based location privacy in mobile services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiDE ![In: Seventh ACM International Workshop on Data Engineering for Wireless and Mobile Access, Mobide 2008, June 13, 2008, Vancouver, British Columbia, Canada, Proceedings, pp. 16-23, 2008, ACM, 978-1-60558-221-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
30 | Piotr Cofta |
Confidence-Compensating Privacy Protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Sixth Annual Conference on Privacy, Security and Trust, PST 2008, October 1-3, 2008, Fredericton, New Brunswick, Canada, pp. 65-74, 2008, IEEE Computer Society, 978-0-7695-3390-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
30 | Susana Alcalde Bagüés, Jelena Mitic, Andreas Zeidler, Marta Tejada, Ignacio R. Matías, Carlos Fernández-Valdivielso |
Obligations: Building a Bridge between Personal and Enterprise Privacy in Pervasive Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustBus ![In: Trust, Privacy and Security in Digital Business, 5th International Conference, TrustBus 2008, Turin, Italy, September 4-5, 2008, Proceedings, pp. 173-184, 2008, Springer, 978-3-540-85734-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
30 | Justin Z. Zhan |
Quantifying Privacy for Privacy Preserving Data Mining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIDM ![In: Proceedings of the IEEE Symposium on Computational Intelligence and Data Mining, CIDM 2007, part of the IEEE Symposium Series on Computational Intelligence 2007, Honolulu, Hawaii, USA, 1-5 April 2007, pp. 630-636, 2007, IEEE, 1-4244-0705-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
30 | Siu Man Lui, Ling Qiu |
Individual Privacy and Organizational Privacy in Business Analytics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), CD-ROM / Abstracts Proceedings, 3-6 January 2007, Waikoloa, Big Island, HI, USA, pp. 216, 2007, IEEE Computer Society, 0-7695-2755-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
30 | Ronggong Song, Larry Korba, George Yee |
Privacy Rights Management for Privacy Compliance Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA Workshops (1) ![In: 21st International Conference on Advanced Information Networking and Applications (AINA 2007), Workshops Proceedings, Volume 1, May 21-23, 2007, Niagara Falls, Canada, pp. 620-625, 2007, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
30 | Jaijit Bhattacharya, S. K. Gupta 0001, Bhurvi Agrawal |
Protecting Privacy of Health Information through Privacy Broker. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 39th Hawaii International International Conference on Systems Science (HICSS-39 2006), CD-ROM / Abstracts Proceedings, 4-7 January 2006, Kauai, HI, USA, 2006, IEEE Computer Society, 0-7695-2507-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
30 | George Yee, Larry Korba, Ronggong Song |
Ensuring Privacy for Buyer-Seller E-Commerce. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Security and Privacy in Dynamic Environments, Proceedings of the IFIP TC-11 21st International Information Security Conference (SEC 2006), 22-24 May 2006, Karlstad, Sweden, pp. 13-24, 2006, Springer, 0-387-33405-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
30 | Marco Casassa Mont |
Towards Scalable Management of Privacy Obligations in Enterprises. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustBus ![In: Trust and Privacy in Digital Business, Third International Conference, TrustBus 2006, Krakow, Poland, September 4-8, 2006, Proceedings, pp. 1-10, 2006, Springer, 3-540-37750-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
30 | Byungil Lee, Howon Kim 0001 |
A Design of Privacy Conscious RFID System Using Customizing Privacy Policy Based Access Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUC Workshops ![In: Embedded and Ubiquitous Computing - EUC 2005 Workshops, EUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Nagasaki, Japan, December 6-9, 2005, Proceedings, pp. 673-682, 2005, Springer, 3-540-30803-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
30 | Marco Casassa Mont, Robert Thyne, Pete Bramhall |
Privacy Enforcement for IT Governance in Enterprises: Doing It for Real. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustBus ![In: Trust, Privacy and Security in Digital Business: Second International Conference, TrustBus 2005, Copenhagen, Denmark, August 22-26, 2005, Proceedings, pp. 226-235, 2005, Springer, 3-540-28224-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
30 | Marco Casassa Mont, Siani Pearson |
An Adaptive Privacy Management System for Data Repositories. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustBus ![In: Trust, Privacy and Security in Digital Business: Second International Conference, TrustBus 2005, Copenhagen, Denmark, August 22-26, 2005, Proceedings, pp. 236-245, 2005, Springer, 3-540-28224-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
30 | Hannes Federrath |
Privacy Enhanced Technologies: Methods - Markets - Misuse. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustBus ![In: Trust, Privacy and Security in Digital Business: Second International Conference, TrustBus 2005, Copenhagen, Denmark, August 22-26, 2005, Proceedings, pp. 1-9, 2005, Springer, 3-540-28224-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
30 | Larry Korba, Steve Kenny |
Towards Meeting the Privacy Challenge: Adapting DRM. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Rights Management Workshop ![In: Security and Privacy in Digital Rights Management, ACM CCS-9 Workshop, DRM 2002, Washington, DC, USA, November 18, 2002, Revised Papers, pp. 118-136, 2002, Springer, 3-540-40410-4. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
29 | Anasuya Bulkan |
Is privacy an attainable goal?: a review of the privacy rights dilemma. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006, pp. 73, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
privacy contract, rights and ethics, policy |
29 | Julien Freudiger, Reza Shokri, Jean-Pierre Hubaux |
On the Optimal Placement of Mix Zones. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy Enhancing Technologies ![In: Privacy Enhancing Technologies, 9th International Symposium, PETS 2009, Seattle, WA, USA, August 5-7, 2009. Proceedings, pp. 216-234, 2009, Springer, 978-3-642-03167-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
29 | Shi-Cho Cha 0001, Yuh-Jzer Joung |
From P3P to Data Licenses. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy Enhancing Technologies ![In: Privacy Enhancing Technologies, Third International Workshop, PET 2003, Dresden, Germany, March 26-28, 2003, Revised Papers, pp. 205-222, 2003, Springer, 3-540-20610-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
29 | Ralf Küsters, Tomasz Truderung, Andreas Vogt 0001 |
Verifiability, Privacy, and Coercion-Resistance: New Insights from a Case Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Symposium on Security and Privacy ![In: 32nd IEEE Symposium on Security and Privacy, SP 2011, 22-25 May 2011, Berkeley, California, USA, pp. 538-553, 2011, IEEE Computer Society, 978-1-4577-0147-4. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
privacy, voting, protocol analysis, verifiability, coercion-resistance |
29 | Matthew Fredrikson, Benjamin Livshits |
RePriv: Re-imagining Content Personalization and In-browser Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Symposium on Security and Privacy ![In: 32nd IEEE Symposium on Security and Privacy, SP 2011, 22-25 May 2011, Berkeley, California, USA, pp. 131-146, 2011, IEEE Computer Society, 978-1-4577-0147-4. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
Privacy, Personalization, Web Applications, Software Verification |
29 | Peter G. Neumann, Matt Bishop, Sean Peisert, Marv Schaefer |
Reflections on the 30th Anniversary of the IEEE Symposium on Security and Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Symposium on Security and Privacy ![In: 31st IEEE Symposium on Security and Privacy, SP 2010, 16-19 May 2010, Berleley/Oakland, California, USA, pp. 3-13, 2010, IEEE Computer Society, 978-0-7695-4035-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
30th Anniversary Retrospective, Security, Privacy |
29 | Josep Domingo-Ferrer, Maria Bras-Amorós |
Peer-to-Peer Private Information Retrieval. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy in Statistical Databases ![In: Privacy in Statistical Databases, UNESCO Chair in Data Privacy International Conference, PSD 2008, Istanbul, Turkey, September 24-26, 2008. Proceedings, pp. 315-323, 2008, Springer, 978-3-540-87470-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Privacy in statistical databases, private information retrieval, combinatorial designs |
29 | Stan Matwin, Tomasz Szapiro |
Data Privacy: From Technology to Economics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Advances in Machine Learning II ![In: Advances in Machine Learning II, Dedicated to the Memory of Professor Ryszard S. Michalski, pp. 43-74, 2010, Springer, 978-3-642-05178-4. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
29 | Tomas Isdal, Michael Piatek, Arvind Krishnamurthy, Thomas E. Anderson |
Privacy-preserving P2P data sharing with OneSwarm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCOMM ![In: Proceedings of the ACM SIGCOMM 2010 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, New Delhi, India, August 30 -September 3, 2010, pp. 111-122, 2010, ACM, 978-1-4503-0201-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
oneswarm |
29 | Yang Wang 0005, Alfred Kobsa |
Performance Evaluation of a Privacy-Enhancing Framework for Personalized Websites. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UMAP ![In: User Modeling, Adaptation, and Personalization, 17th International Conference, UMAP 2009, formerly UM and AH, Trento, Italy, June 22-26, 2009. Proceedings, pp. 78-89, 2009, Springer, 978-3-642-02246-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
29 | Thorben Burghardt, Erik Buchmann, Jens Müller 0002, Klemens Böhm |
Understanding User Preferences and Awareness: Privacy Mechanisms in Location-Based Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OTM Conferences (1) ![In: On the Move to Meaningful Internet Systems: OTM 2009, Confederated International Conferences, CoopIS, DOA, IS, and ODBASE 2009, Vilamoura, Portugal, November 1-6, 2009, Proceedings, Part I, pp. 304-321, 2009, Springer, 978-3-642-05147-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
29 | Ye Zhu 0001, Yongjian Fu 0001, Huirong Fu |
Preserving Privacy in Time Series Data Classification by Discretization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MLDM ![In: Machine Learning and Data Mining in Pattern Recognition, 6th International Conference, MLDM 2009, Leipzig, Germany, July 23-25, 2009. Proceedings, pp. 53-67, 2009, Springer, 978-3-642-03069-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
29 | Chowdhury Sharif Hasan, Sheikh Iqbal Ahamed, Mohammad Tanviruzzaman |
A Privacy Enhancing Approach for Identity Inference Protection in Location-Based Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC (1) ![In: Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, COMPSAC 2009, Seattle, Washington, USA, July 20-24, 2009. Volume 1, pp. 1-10, 2009, IEEE Computer Society, 978-0-7695-3726-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
29 | Youwen Zhu, Liusheng Huang, Wei Yang 0011, Dong Li, Yonglong Luo, Fan Dong |
Three New Approaches to Privacy-preserving Add to Multiply Protocol and its Application. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WKDD ![In: Proceedings of the Second International Workshop on Knowledge Discovery and Data Mining, WKDD 2009, Moscow, Russia, 23-25 January 2009, pp. 554-558, 2009, IEEE Computer Society, 978-0-7695-3543-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
29 | Heather Richter Lipford, Gordon Hull, Celine Latulipe, Andrew Besmer, Jason Watson |
Visible Flows: Contextual Integrity and the Design of Privacy Mechanisms on Social Network Sites. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSE (4) ![In: Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, CSE 2009, Vancouver, BC, Canada, August 29-31, 2009, pp. 985-989, 2009, IEEE Computer Society, 978-1-4244-5334-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
29 | Victor Manuel García-Barrios |
User-centric Privacy Framework: Integrating Legal, Technological and Human Aspects into User-Adapting Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSE (3) ![In: Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, CSE 2009, Vancouver, BC, Canada, August 29-31, 2009, pp. 176-181, 2009, IEEE Computer Society, 978-1-4244-5334-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
Displaying result #401 - #500 of 63336 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ 14][ >>] |
|