|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 11410 occurrences of 3224 keywords
|
|
|
Results
Found 63337 publication records. Showing 63336 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
29 | A. K. Upadhayay, Abhijat Agarwal, Rachita Masand, Rajeev Gupta |
Privacy Preserving Data Mining: A New Methodology for Data Transformation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IHCI ![In: Proceedings of the First International Conference on Intelligent Human Computer Interaction, IHCI 2009, January 20-23, 2009, Organized by the Indian Institute of Information Technology, Allahabad, India, pp. 372-390, 2009, Springer India, 978-81-8489-404-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
29 | Millist W. Vincent, Mukesh K. Mohania, Mizuho Iwaihara |
Detecting privacy violations in database publishing using disjoint queries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EDBT ![In: EDBT 2009, 12th International Conference on Extending Database Technology, Saint Petersburg, Russia, March 24-26, 2009, Proceedings, pp. 252-262, 2009, ACM, 978-1-60558-422-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
29 | Peter J. Carew, Larry Stapleton, Gabriel J. Byrne |
Implications of an ethic of privacy for human-centred systems engineering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AI Soc. ![In: AI Soc. 22(3), pp. 385-403, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Ming-Hour Yang, Jain-Shing Wu, Shih-Jen Chen |
Protect mobile RFID location privacy using dynamic identity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE ICCI ![In: Proceedings of the Seventh IEEE International Conference on Cognitive Informatics, ICCI 2008, Stanford University, California, USA, August 14-16, 2008, pp. 366-374, 2008, IEEE Computer Society, 978-1-4244-2538-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Louis-François Pau |
Privacy management service contacts as a new business opportunity for operators. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NOMS ![In: IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, NOMS 2008, 7-11 April 2008, Salvador, Bahia, Brazil, pp. 730-733, 2008, IEEE, 978-1-4244-2066-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Giannakis Antoniou, Lynn Margaret Batten, Parampalli Udaya |
Designing Information Systems Which Manage or Avoid Privacy Incidents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroISI ![In: Intelligence and Security Informatics, First European Conference, EuroISI 2008, Esbjerg, Denmark, December 3-5, 2008. Proceedings, pp. 131-142, 2008, Springer, 978-3-540-89899-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Simon Moncrieff, Svetha Venkatesh, Geoff A. W. West |
Context aware privacy in visual surveillance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPR ![In: 19th International Conference on Pattern Recognition (ICPR 2008), December 8-11, 2008, Tampa, Florida, USA, pp. 1-4, 2008, IEEE Computer Society, 978-1-4244-2175-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Anrong Xue, Xiqiang Duan, Handa Ma, Weihe Chen, Shiguang Ju |
Privacy Preserving Spatial Outlier Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICYCS ![In: Proceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008, Zhang Jia Jie, Hunan, China, November 18-21, 2008, pp. 714-719, 2008, IEEE Computer Society, 978-0-7695-3398-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Zhenyu Zhong, Lakshmish Ramaswamy, Kang Li 0001 |
ALPACAS: A Large-Scale Privacy-Aware Collaborative Anti-Spam System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INFOCOM ![In: INFOCOM 2008. 27th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, 13-18 April 2008, Phoenix, AZ, USA, pp. 556-564, 2008, IEEE, 978-1-4244-2026-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Gene Tsudik, Mike Burmester, Ari Juels, Alfred Kobsa, David Molnar, Roberto Di Pietro, Melanie R. Rieback |
RFID security and privacy: long-term research or short-term tinkering? ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the First ACM Conference on Wireless Network Security, WISEC 2008, Alexandria, VA, USA, March 31 - April 02, 2008, pp. 160, 2008, ACM, 978-1-59593-814-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Xuehua Shen, Bin Tan, ChengXiang Zhai |
Privacy protection in personalized search. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGIR Forum ![In: SIGIR Forum 41(1), pp. 4-17, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
29 | Sheikh Iqbal Ahamed, Nilothpal Talukder, Munirul M. Haque |
Privacy Challenges in Context-sensitive Access Control for Pervasive Computing Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiQuitous ![In: 4th Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2007), August 6-10, 2007, Philadelphia, PA, USA, pp. 1-6, 2007, IEEE Computer Society, 978-1-4244-1024-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
29 | Salima Benbernou, Hassina Meziane, Mohand-Said Hacid |
Run-Time Monitoring for Privacy-Agreement Compliance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSOC ![In: Service-Oriented Computing - ICSOC 2007, Fifth International Conference, Vienna, Austria, September 17-20, 2007, Proceedings, pp. 353-364, 2007, Springer, 978-3-540-74973-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
29 | Michael Hecker, Tharam S. Dillon |
Privacy Support and Evaluation on an Ontological Basis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDE Workshops ![In: Proceedings of the 23rd International Conference on Data Engineering Workshops, ICDE 2007, 15-20 April 2007, Istanbul, Turkey, pp. 221-227, 2007, IEEE Computer Society, 978-1-4244-0831-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
29 | George Yee |
Visual Analysis of Privacy Risks in Web Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICWS ![In: 2007 IEEE International Conference on Web Services (ICWS 2007), July 9-13, 2007, Salt Lake City, Utah, USA, pp. 671-678, 2007, IEEE Computer Society, 0-7695-2924-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
29 | Serge Vaudenay |
On Privacy Models for RFID. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2007, 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007, Proceedings, pp. 68-87, 2007, Springer, 978-3-540-76899-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
29 | Weider D. Yu, Savitha Murthy |
PPMLP: A Special Modeling Language Processor for Privacy Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the 12th IEEE Symposium on Computers and Communications (ISCC 2007), July 1-4, Aveiro, Portugal, pp. 851-858, 2007, IEEE Computer Society, 978-1-4244-1520-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
29 | Apu Kapadia, Tristan Henderson, Jeffrey J. Fielding, David Kotz |
Virtual Walls: Protecting Digital Privacy in Pervasive Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Pervasive ![In: Pervasive Computing, 5th International Conference, PERVASIVE 2007, Toronto, Canada, May 13-16, 2007, Proceedings, pp. 162-179, 2007, Springer, 978-3-540-72036-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
29 | Ibrahim Yakut, Huseyin Polat 0001 |
Privacy-Preserving Eigentaste-Based Collaborative Filtering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security, Second International Workshop on Security, IWSEC 2007, Nara, Japan, October 29-31, 2007, Proceedings, pp. 169-184, 2007, Springer, 978-3-540-75650-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
29 | Huidong Jin 0001, Jie Chen 0004, Hongxing He, Christine M. O'Keefe |
Privacy-Preserving Sequential Pattern Release. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PAKDD ![In: Advances in Knowledge Discovery and Data Mining, 11th Pacific-Asia Conference, PAKDD 2007, Nanjing, China, May 22-25, 2007, Proceedings, pp. 547-554, 2007, Springer, 978-3-540-71700-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
29 | Salima Benbernou, Hassina Meziane, Yin Hua Li, Mohand-Said Hacid |
A Privacy Agreement Model for Web Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE SCC ![In: 2007 IEEE International Conference on Services Computing (SCC 2007), 9-13 July 2007, Salt Lake City, Utah, USA, pp. 196-203, 2007, IEEE Computer Society, 0-7695-2925-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
29 | Batya Friedman, Ian E. Smith, Peter H. Kahn Jr., Sunny Consolvo, Jaina Selawski |
Development of a Privacy Addendum for Open Source Licenses: Value Sensitive Design in Industry. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UbiComp ![In: UbiComp 2006: Ubiquitous Computing, 8th International Conference, UbiComp 2006, Orange County, CA, USA, September 17-21, 2006, pp. 194-211, 2006, Springer, 3-540-39634-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
29 | Ali Inan, Yücel Saygin, Erkay Savas, Ayça Azgin Hintoglu, Albert Levi |
Privacy Preserving Clustering on Horizontally Partitioned Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDE Workshops ![In: Proceedings of the 22nd International Conference on Data Engineering Workshops, ICDE 2006, 3-7 April 2006, Atlanta, GA, USA, pp. 95, 2006, IEEE Computer Society, 0-7695-2571-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
29 | George Yee |
Measuring Privacy Protection in Web Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICWS ![In: 2006 IEEE International Conference on Web Services (ICWS 2006), 18-22 September 2006, Chicago, Illinois, USA, pp. 647-654, 2006, IEEE Computer Society, 0-7695-2669-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
29 | Shyam K. Gupta 0001, Vikram Goyal, Bholi Patra, Sankalp Dubey, Anand Gupta |
Design and Development of Malafide Intension Based Privacy Violation Detection System (An Ongoing Research Report). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, Second International Conference, ICISS 2006, Kolkata, India, December 19-21, 2006, Proceedings, pp. 369-372, 2006, Springer, 3-540-68962-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
29 | Shyam K. Gupta 0001, Vikram Goyal, Anand Gupta |
Malafide Intension Based Detection of Privacy Violation in Information System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, Second International Conference, ICISS 2006, Kolkata, India, December 19-21, 2006, Proceedings, pp. 365-368, 2006, Springer, 3-540-68962-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
29 | Ashwin Machanavajjhala, Johannes Gehrke |
On the efficiency of checking perfect privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PODS ![In: Proceedings of the Twenty-Fifth ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, June 26-28, 2006, Chicago, Illinois, USA, pp. 163-172, 2006, ACM, 1-59593-318-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
29 | Bharat K. Bhargava |
Innovative Ideas in Privacy Research (Keynote Talk). ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA Workshops ![In: 17th International Workshop on Database and Expert Systems Applications (DEXA 2006), 4-8 September 2006, Krakow, Poland, pp. 677-681, 2006, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
29 | Harold van Heerde, Nicolas Anciaux, Ling Feng, Peter M. G. Apers |
Balancing Smartness and Privacy for the Ambient Intelligence. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroSSC ![In: Smart Sensing and Context, First European Conference, EuroSSC 2006, Enschede, Netherlands, October 25-27, 2006, Proceedings, pp. 255-258, 2006, Springer, 3-540-47842-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
29 | Kamalika Chaudhuri, Nina Mishra |
When Random Sampling Preserves Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2006, 26th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2006, Proceedings, pp. 198-213, 2006, Springer, 3-540-37432-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
29 | Shyam K. Gupta 0001, Sankalp Dubey, Vikram Goyal, Anand Gupta |
A System to test malafide intension based on privacy violation detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDIM ![In: First IEEE International Conference on Digital Information Management (ICDIM), December 6-8, 2006, Christ College, Bangalore, India, Proceedings, pp. 47-54, 2006, IEEE, 1-4244-0682-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
29 | Elisa Bertino, Igor Nai Fovino, Loredana Parasiliti Provenza |
A Framework for Evaluating Privacy Preserving Data Mining Algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Min. Knowl. Discov. ![In: Data Min. Knowl. Discov. 11(2), pp. 121-154, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
29 | Zhiqiang Yang, Rebecca N. Wright |
Improved Privacy-Preserving Bayesian Network Parameter Learning on Vertically Partitioned Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDE Workshops ![In: Proceedings of the 21st International Conference on Data Engineering Workshops, ICDE 2005, 5-8 April 2005, Tokyo, Japan, pp. 1196, 2005, IEEE Computer Society, 0-7695-2657-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
29 | Shipra Agrawal 0001, Jayant R. Haritsa |
A Framework for High-Accuracy Privacy-Preserving Mining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDE ![In: Proceedings of the 21st International Conference on Data Engineering, ICDE 2005, 5-8 April 2005, Tokyo, Japan, pp. 193-204, 2005, IEEE Computer Society, 0-7695-2285-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
29 | Jari Arkko, Pekka Nikander, Mats Näslund |
Enhancing Privacy with Shared Pseudo Random Sequences. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers, pp. 187-196, 2005, Springer, 978-3-540-77155-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
29 | Cungang Yang, Chang N. Zhang |
A Privacy Enhanced Role-Based Access Control Model for Enterprises. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCNMC ![In: Networking and Mobile Computing, Third International Conference, ICCNMC 2005, Zhangjiajie, China, August 2-4, 2005, Proceedings, pp. 1012-1021, 2005, Springer, 3-540-28102-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
29 | Tae Joong Kim, In-Ho Kim, Sang Won Lee |
Information Privacy Engineering in ubiComp. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES (3) ![In: Knowledge-Based Intelligent Information and Engineering Systems, 9th International Conference, KES 2005, Melbourne, Australia, September 14-16, 2005, Proceedings, Part III, pp. 628-634, 2005, Springer, 3-540-28896-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
29 | George Yee, Larry Korba |
An Agent Architecture for e-Services Privacy Policy Compliance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA ![In: 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 28-30 March 2005, Taipei, Taiwan, pp. 374-379, 2005, IEEE Computer Society, 0-7695-2249-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
29 | Hartmut Klauck |
Quantum and Approximate Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Theory Comput. Syst. ![In: Theory Comput. Syst. 37(1), pp. 221-246, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
29 | Mike Burmester, Yvo Desmedt, Rebecca N. Wright, Alec Yasinsac |
Accountable Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papers, pp. 83-95, 2004, Springer, 3-540-40925-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
29 | Rebecca N. Wright |
Accountable Privacy (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papers, pp. 96-105, 2004, Springer, 3-540-40925-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
29 | Jan Camenisch |
Better Privacy for Trusted Computing Platforms: (Extended Abstract). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2004, 9th European Symposium on Research Computer Security, Sophia Antipolis, France, September 13-15, 2004, Proceedings, pp. 73-88, 2004, Springer, 3-540-22987-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
29 | Michael Backes 0001, Birgit Pfitzmann, Matthias Schunter |
A Toolkit for Managing Enterprise Privacy Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2003, 8th European Symposium on Research in Computer Security, Gjøvik, Norway, October 13-15, 2003, Proceedings, pp. 162-180, 2003, Springer, 3-540-20300-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
29 | Abdelmounaam Rezgui, Athman Bouguettaya, Zaki Malik |
A Reputation-Based Approach to Preserving Privacy in Web Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TES ![In: Technologies for E-Services, 4th International Workshop, TES 2003, Berlin, Germany, September 8, 2003, Proceedings, pp. 91-103, 2003, Springer, 3-540-20052-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
29 | Marc Langheinrich |
A Privacy Awareness System for Ubiquitous Computing Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UbiComp ![In: UbiComp 2002: Ubiquitous Computing, 4th International Conference, Göteborg, Sweden, September 29 - October 1, 2002, Proceedings, pp. 237-245, 2002, Springer, 3-540-44267-7. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
29 | Yuval Elovici, Bracha Shapira, Adlai Maschiach |
A New Privacy Model for Web Surfing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NGITS ![In: Next Generation Information Technologies and Systems, 5th International Workshop, NGITS 2002, Caesarea, Israel, June 24-25, 2002, Proceedings, pp. 45-57, 2002, Springer, 3-540-43819-X. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
29 | Hartmut Klauck |
On Quantum and Approximate Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STACS ![In: STACS 2002, 19th Annual Symposium on Theoretical Aspects of Computer Science, Antibes - Juan les Pins, France, March 14-16, 2002, Proceedings, pp. 335-346, 2002, Springer, 3-540-43283-3. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
29 | Dakshi Agrawal, Charu C. Aggarwal |
On the Design and Quantification of Privacy Preserving Data Mining Algorithms. (PDF / PS) ![Search on Bibsonomy](Pics/bibsonomy.png) |
PODS ![In: Proceedings of the Twentieth ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, May 21-23, 2001, Santa Barbara, California, USA, 2001, ACM, 1-58113-361-8. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
29 | John Salasin |
A control systems model of privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AFIPS National Computer Conference ![In: American Federation of Information Processing Societies: 1976 National Computer Conference, 7-10 June 1976, New York, NY, USA, pp. 45-51, 1976, AFIPS Press, 978-1-4503-7917-5. The full citation details ...](Pics/full.jpeg) |
1976 |
DBLP DOI BibTeX RDF |
|
29 | Maritza Johnson, John Karat, Clare-Marie Karat, Keith Grueneberg |
Optimizing a policy authoring framework for security and privacy policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOUPS ![In: Proceedings of the Sixth Symposium on Usable Privacy and Security, SOUPS 2010, Redmond, Washington, USA, July 14-16, 2010, 2010, ACM, 978-1-4503-0264-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
security policy, privacy policy, user experience design, policy management, policy refinement, policy authoring |
29 | Andrew Besmer, Jason Watson, Heather Richter Lipford |
The impact of social navigation on privacy policy configuration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOUPS ![In: Proceedings of the Sixth Symposium on Usable Privacy and Security, SOUPS 2010, Redmond, Washington, USA, July 14-16, 2010, 2010, ACM, 978-1-4503-0264-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
policy configuration, privacy, social networking, social navigation |
29 | Moez Waddey, Pascal Poncelet, Sadok Ben Yahia |
A novel approach for privacy mining of generic basic association rules. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIKM-PAVLAD ![In: Proceeding of the ACM First International Workshop on Privacy and Anonymity for Very Large Databases, CIKM-PAVLAD 2009, Hong Kong, China, November 6, 2009, pp. 45-52, 2009, ACM. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
commutative encryption, data mining, association rules mining, privacy preserving |
29 | Roshan K. Thomas, Ravi S. Sandhu, Elisa Bertino, Ismailcem Budak Arpinar, Shouhuai Xu |
Privacy-Preserving Accountable Accuracy Management Systems (PAAMS). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISIPS ![In: Protecting Persons While Protecting the People, Second Annual Workshop on Information Privacy and National Security, ISIPS 2008, New Brunswick, NJ, USA, May 12, 2008. Revised Selected Papers, pp. 115-121, 2008, Springer, 978-3-642-10232-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
privacy, accuracy, accountability, entity disambiguation |
29 | Paul B. Kantor, Michael E. Lesk |
The Challenges of Seeking Security While Respecting Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISIPS ![In: Protecting Persons While Protecting the People, Second Annual Workshop on Information Privacy and National Security, ISIPS 2008, New Brunswick, NJ, USA, May 12, 2008. Revised Selected Papers, pp. 1-10, 2008, Springer, 978-3-642-10232-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
intelligence agencies, computer security, national security, personal privacy |
29 | Janne Lindqvist, Juha-Matti Tapio |
Protecting privacy with protocol stack virtualization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WPES ![In: Proceedings of the 2008 ACM Workshop on Privacy in the Electronic Society, WPES 2008, Alexandria, VA, USA, October 27, 2008, pp. 65-74, 2008, ACM, 978-1-60558-289-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
protocol stack virtualization, privacy, pseudonymity |
29 | Elisa Bertino, Bhavani Thuraisingham, Michael Gertz 0001, Maria Luisa Damiani |
Security and privacy for geospatial data: concepts and research directions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SPRINGL ![In: Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS, SPRINGL 2008, November 4, 2008, Irvine, California, USA, Proceedings, pp. 6-19, 2008, ACM. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
security, privacy, GIS, geospatial data |
29 | Dan Lin 0001, Elisa Bertino, Reynold Cheng, Sunil Prabhakar |
Position transformation: a location privacy protection method for moving objects. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SPRINGL ![In: Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS, SPRINGL 2008, November 4, 2008, Irvine, California, USA, Proceedings, pp. 62-71, 2008, ACM. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
moving objects, location privacy |
29 | Somesh Jha, Louis Kruger, Vitaly Shmatikov |
Towards Practical Privacy for Genomic Computation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SP ![In: 2008 IEEE Symposium on Security and Privacy (SP 2008), 18-21 May 2008, Oakland, California, USA, pp. 216-230, 2008, IEEE Computer Society, 978-0-7695-3168-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Privacy, Edit Distance, Genome, Secure Multi-Party Computation, Smith-Waterman |
29 | Ben Smyth, Mark Ryan 0001, Liqun Chen 0002 |
Direct Anonymous Attestation (DAA): Ensuring Privacy with Corrupt Administrators. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESAS ![In: Security and Privacy in Ad-hoc and Sensor Networks, 4th European Workshop, ESAS 2007, Cambridge, UK, July 2-3, 2007, Proceedings, pp. 218-231, 2007, Springer, 978-3-540-73274-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
privacy, anonymity, cryptographic protocol, trusted computing |
29 | Neil Bird, Claudine Conrado, Jorge Guajardo, Stefan Maubach, Geert Jan Schrijen, Boris Skoric, Anton M. H. Tombeur, Peter Thueringer, Pim Tuyls |
ALGSICS - Combining Physics and Cryptography to Enhance Security and Privacy in RFID Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESAS ![In: Security and Privacy in Ad-hoc and Sensor Networks, 4th European Workshop, ESAS 2007, Cambridge, UK, July 2-3, 2007, Proceedings, pp. 187-202, 2007, Springer, 978-3-540-73274-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
cheap solutions, physics and crypto, privacy, RFID, sensors |
29 | Elena Zheleva, Lise Getoor |
Preserving the Privacy of Sensitive Relationships in Graph Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PinKDD ![In: Privacy, Security, and Trust in KDD, First ACM SIGKDD International Workshop, PinKDD 2007, San Jose, CA, USA, August 12, 2007, Revised Selected Papers, pp. 153-171, 2007, Springer, 978-3-540-78477-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
noisy-or, graph data, privacy, anonymization, social network analysis, identification, link mining |
29 | Wendy Hui Wang, Laks V. S. Lakshmanan |
Probabilistic privacy analysis of published views. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WPES ![In: Proceedings of the 2006 ACM Workshop on Privacy in the Electronic Society, WPES 2006, Alexandria, VA, USA, October 30, 2006, pp. 81-84, 2006, ACM, 1-59593-556-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
privacy breach, private association, published views, probabilistic analysis |
29 | Paul A. Karger |
Privacy and security threat analysis of the federal employee personal identity verification (PIV) program. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOUPS ![In: Proceedings of the 2nd Symposium on Usable Privacy and Security, SOUPS 2006, Pittsburgh, Pennsylvania, USA, July 12-14, 2006, pp. 114-121, 2006, ACM, 1-59593-448-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
privacy, smart cards, personal identification |
29 | Hongxia Jin |
Privacy, traceability, and anonymity for content protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006, pp. 63, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
anonymous trust, security, privacy, tracing, content protection |
29 | Tuomas Aura, Janne Lindqvist, Michael Roe, Anish Mohammed |
Chattering Laptops. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy Enhancing Technologies ![In: Privacy Enhancing Technologies, 8th International Symposium, PETS 2008, Leuven, Belgium, July 23-25, 2008, Proceedings, pp. 167-186, 2008, Springer, 978-3-540-70629-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
network location awareness, Privacy, mobile computing, wireless networks, anonymity |
29 | Krishnamurty Muralidhar, Rathindra Sarathy, Ramesh A. Dandekar |
Why Swap When You Can Shuffle? A Comparison of the Proximity Swap and Data Shuffle for Numeric Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy in Statistical Databases ![In: Privacy in Statistical Databases, CENEX-SDC Project International Conference, PSD 2006, Rome, Italy, December 13-15, 2006, Proceedings, pp. 164-176, 2006, Springer, 3-540-49330-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Privacy, Confidentiality, Shuffling, Swapping, Data masking |
29 | Vicenç Torra, Sadaaki Miyamoto |
Evaluating Fuzzy Clustering Algorithms for Microdata Protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy in Statistical Databases ![In: Privacy in Statistical Databases: CASC Project International Workshop, PSD 2004, Barcelona, Spain, June 9-11, 2004. Proceedings, pp. 175-186, 2004, Springer, 3-540-22118-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Fuzzy clustering, Privacy preserving data mining, Statistical Disclosure Control, Inference Control, Microaggregation, Microdata Protection |
29 | Vicenç Torra |
Microaggregation for Categorical Variables: A Median Based Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy in Statistical Databases ![In: Privacy in Statistical Databases: CASC Project International Workshop, PSD 2004, Barcelona, Spain, June 9-11, 2004. Proceedings, pp. 162-174, 2004, Springer, 3-540-22118-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Masking methods, Clustering, Privacy preserving data mining, Data protection, Categorical data, Microaggregation |
29 | Dmitri Asonov, Johann Christoph Freytag |
Almost Optimal Private Information Retrieval. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy Enhancing Technologies ![In: Privacy Enhancing Technologies, Second International Workshop, PET 2002, San Francisco, CA, USA, April 14-15, 2002, Revised Papers, pp. 209-223, 2002, Springer, 3-540-00565-X. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Efficient realization of privacy services |
28 | Zutao Zhu, Guan Wang, Wenliang Du |
Deriving Private Information from Association Rule Mining Results. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDE ![In: Proceedings of the 25th International Conference on Data Engineering, ICDE 2009, March 29 2009 - April 2 2009, Shanghai, China, pp. 18-29, 2009, IEEE Computer Society, 978-0-7695-3545-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
28 | Naikuo Yang, Howard Barringer, Ning Zhang 0001 |
A Purpose-Based Access Control Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proceedings of the Third International Symposium on Information Assurance and Security, IAS 2007, August 29-31, 2007, Manchester, United Kingdom, pp. 143-148, 2007, IEEE Computer Society, 978-0-7695-2876-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
28 | Xin Jin, Mingyang Zhang 0001, Nan Zhang 0004, Gautam Das 0001 |
Versatile publishing for privacy preservation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KDD ![In: Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Washington, DC, USA, July 25-28, 2010, pp. 353-362, 2010, ACM, 978-1-4503-0055-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
guardian normal form, versatile publishing, decomposition, privacy preservation |
28 | Eran Toch, Norman M. Sadeh, Jason I. Hong |
Generating default privacy policies for online social networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI Extended Abstracts ![In: Proceedings of the 28th International Conference on Human Factors in Computing Systems, CHI 2010, Extended Abstracts Volume, Atlanta, Georgia, USA, April 10-15, 2010, pp. 4243-4248, 2010, ACM, 978-1-60558-930-5. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
default policies, location sharing technology, privacy, information sharing, online social networks |
28 | Meena Dilip Singh, P. Radha Krishna 0001, Ashutosh Saxena |
A cryptography based privacy preserving solution to mine cloud data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Bangalore Compute Conf. ![In: Proceedings of the 3rd Bangalore Annual Compute Conference, Compute 2010, Bangalore, India, January 22-23, 2010, pp. 14:1-14:4, 2010, ACM, 978-1-4503-0001-8. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
encrypted data, private equality test, cryptography, privacy preserving data mining |
28 | Joan Feigenbaum, Aaron D. Jaggard, Michael Schapira |
Approximate privacy: foundations and quantification (extended abstract). ![Search on Bibsonomy](Pics/bibsonomy.png) |
EC ![In: Proceedings 11th ACM Conference on Electronic Commerce (EC-2010), Cambridge, Massachusetts, USA, June 7-11, 2010, pp. 167-178, 2010, ACM, 978-1-60558-822-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
approximate privacy, bisection auction |
28 | Jibang Liu, Karthik Kumar, Yung-Hsiang Lu |
Tradeoff between energy savings and privacy protection in computation offloading. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISLPED ![In: Proceedings of the 2010 International Symposium on Low Power Electronics and Design, 2010, Austin, Texas, USA, August 18-20, 2010, pp. 213-218, 2010, ACM, 978-1-4503-0146-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
image retrieval, steganography, energy saving, privacy protection, computation offloading |
28 | Tanzima Hashem, Lars Kulik, Rui Zhang 0003 |
Privacy preserving group nearest neighbor queries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EDBT ![In: EDBT 2010, 13th International Conference on Extending Database Technology, Lausanne, Switzerland, March 22-26, 2010, Proceedings, pp. 489-500, 2010, ACM, 978-1-60558-945-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
group nearest neighbor queries, private filter, privacy, location |
28 | George Danezis |
Inferring privacy policies for social networking services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISec ![In: Proceedings of the 2nd ACM Workshop on Security and Artificial Intelligence, AISec 2009, Chicago, Illinois, USA, November 9, 2009, pp. 5-10, 2009, ACM, 978-1-60558-781-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
cohesive groups, privacy, social networks |
28 | Julien Freudiger, Mohammad Hossein Manshaei, Jean-Pierre Hubaux, David C. Parkes |
On non-cooperative location privacy: a game-theoretic analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009, pp. 324-337, 2009, ACM, 978-1-60558-894-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
game theory, mobile networks, location privacy |
28 | Josep Domingo-Ferrer |
The Functionality-Security-Privacy Game. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MDAI ![In: Modeling Decisions for Artificial Intelligence, 6th International Conference, MDAI 2009, Awaji Island, Japan, November 30-December 2, 2009. Proceedings, pp. 92-101, 2009, Springer, 978-3-642-04819-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Security, Privacy, Game theory, Mechanism design, Functionality |
28 | Kelly E. Caine |
Supporting privacy by preventing misclosure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI Extended Abstracts ![In: Proceedings of the 27th International Conference on Human Factors in Computing Systems, CHI 2009, Extended Abstracts Volume, Boston, MA, USA, April 4-9, 2009, pp. 3145-3148, 2009, ACM, 978-1-60558-247-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
misclosure, privacy, ubiquitous computing, error, aging, older adult, technology acceptance, disclosure |
28 | Juan Ramón Troncoso-Pastoriza, Pedro Comesaña, Luis Pérez-Freire, Fernando Pérez-González |
Videosurveillance and privacy: covering the two sides of the mirror with DRM. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Rights Management Workshop ![In: Proceedings of the 9th ACM Workshop on Digital Rights Management, Chicago, Illinois, USA, November 9, 2009, pp. 83-94, 2009, ACM, 978-1-60558-779-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
videosurveillance, security, privacy, access control, rights management |
28 | Edith C. H. Ngai, Ioana Rodhe |
On providing location privacy for mobile sinks in wireless sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MSWiM ![In: Proceedings of the 12th International Symposium on Modeling Analysis and Simulation of Wireless and Mobile Systems, MSWiM 2009, Tenerife, Canary Islands, Spain, October 26-19, 2009, pp. 116-123, 2009, ACM, 978-1-60558-616-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
wireless sensor networks, privacy, data collection |
28 | Saila Ovaska, Kari-Jouko Räihä |
Teaching privacy with ubicomp scenarios in HCI classes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OZCHI ![In: Proceedings of the 21st Australasian Computer-Human Interaction Conference, OZCHI 2009: Open 24/7, Melbourne, Australia, November 23-27, 2009, pp. 105-112, 2009, ACM, 978-1-60558-854-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
privacy, ubiquitous computing, scenario, HCI education |
28 | Rachel Greenstadt |
An overview of privacy improvements to k-optimal DCOP algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAMAS (2) ![In: 8th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2009), Budapest, Hungary, May 10-15, 2009, Volume 2, pp. 1279-1280, 2009, IFAAMAS, 978-0-9817381-7-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
security and privacy, distributed constraint optimization |
28 | Kenneth G. Paterson, Sriramkrishnan Srinivasan |
Building Key-Private Public-Key Encryption Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 14th Australasian Conference, ACISP 2009, Brisbane, Australia, July 1-3, 2009, Proceedings, pp. 276-292, 2009, Springer, 978-3-642-02619-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
multiple trusted authorities, TA anonymity, standard model, public-key encryption, identity-based encryption, key-privacy |
28 | Eleni Kosta, Christos Kalloniatis, Lilian Mitrou, Evangelia Kavakli |
Search Engines: Gateway to a New "Panopticon"? ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustBus ![In: Trust, Privacy and Security in Digital Business, 6th International Conference, TrustBus 2009, Linz, Austria, September 3-4, 2009. Proceedings, pp. 11-21, 2009, Springer, 978-3-642-03747-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
privacy, search engines, cookies, search logs |
28 | Theodoros Balopoulos, Stefanos Gritzalis, Sokratis K. Katsikas |
Specifying and implementing privacy-preserving cryptographic protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 7(6), pp. 395-420, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Specification of Security Protocols, Dolev-Yao Intruder, Security-typed language, Typed MSR, Jif, Privacy, Linkability |
28 | Bart De Decker, Mohamed Layouni, Hans Vangheluwe, Kristof Verslype |
A Privacy-Preserving eHealth Protocol Compliant with the Belgian Healthcare System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, 5th European PKI Workshop: Theory and Practice, EuroPKI 2008, Trondheim, Norway, June 16-17, 2008, Proceedings, pp. 118-133, 2008, Springer, 978-3-540-69484-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
electronic healthcare, privacy, anonymous credentials |
28 | Katherine Strater, Heather Richter Lipford |
Strategies and struggles with privacy in an online social networking community. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BCS HCI (1) ![In: Proceedings of the 22nd British HCI Group Annual Conference on HCI 2008: People and Computers XXII: Culture, Creativity, Interaction - Volume 1, BCS HCI 2008, Liverpool, United Kingdom, 1-5 September 2008, pp. 111-119, 2008, BCS, 978-1-906124-04-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
privacy, Facebook, online social networks |
28 | Mohammad Mannan, Paul C. van Oorschot |
Privacy-enhanced sharing of personal content on the web. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW ![In: Proceedings of the 17th International Conference on World Wide Web, WWW 2008, Beijing, China, April 21-25, 2008, pp. 487-496, 2008, ACM, 978-1-60558-085-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
circle of trust, privacy, access control, sharing |
28 | Dong Seong Kim 0001, Muhammad Anwarul Azim, Jong Sou Park |
Privacy Preserving Support Vector Machines in Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Third International Conference on Availability, Reliability and Security, ARES 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain, pp. 1260-1265, 2008, IEEE Computer Society, 978-0-7695-3102-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
security, data mining, Sensor networks, energy efficiency, privacy preserving data mining |
28 | Stefan G. Weber, Andreas Heinemann, Max Mühlhäuser |
Towards an Architecture for Balancing Privacy and Traceability in Ubiquitous Computing Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Third International Conference on Availability, Reliability and Security, ARES 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain, pp. 958-964, 2008, IEEE Computer Society, 978-0-7695-3102-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Privacy, Ubiquitous Computing, Traceability |
28 | Esma Aïmeur, Gilles Brassard, José M. Fernandez 0001, Flavien Serge Mani Onana, Zbigniew Rakowski |
Experimental Demonstration of a Hybrid Privacy-Preserving Recommender System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Third International Conference on Availability, Reliability and Security, ARES 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain, pp. 161-170, 2008, IEEE Computer Society, 978-0-7695-3102-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
recommender systems, privacy protection, hybrid recommender systems |
28 | Shaofei Wu, Hui Wang |
Research on the Privacy Preserving Algorithm of Association Rule Mining in Centralized Database. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISIP ![In: International Symposium on Information Processing, ISIP 2008 / International Pacific Workshop on Web Mining, and Web-Based Application, WMWA 2008, Moscow, Russia, 23-25 May 2008, pp. 131-134, 2008, IEEE Computer Society, 978-0-7695-3151-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Data Mining, Privacy Preserving, Restrictive |
28 | Nhan Tran, Vijay Somers |
Modeling privacy compromise: visibility of individuals via DRM and RFID in ubiquitous computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SpringSim ![In: Proceedings of the 2008 Spring Simulation Multiconference, SpringSim 2008, Ottawa, Canada, April 14-17, 2008, pp. 17, 2008, SCS/ACM, 1-56555-319-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
distributed security, modeling, privacy, ubiquitous computing, pervasive computing, RFID, digital rights management |
28 | Shipeng Yu, Glenn Fung, Rómer Rosales, Sriram Krishnan, R. Bharat Rao, Cary Dehing-Oberije, Philippe Lambin |
Privacy-preserving cox regression for survival analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KDD ![In: Proceedings of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Las Vegas, Nevada, USA, August 24-27, 2008, pp. 1034-1042, 2008, ACM, 978-1-60558-193-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
cox regression, privacy-preserving data mining, survival analysis |
28 | Xiaokui Xiao, Yufei Tao 0001 |
Dynamic anonymization: accurate statistical analysis with privacy preservation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMOD Conference ![In: Proceedings of the ACM SIGMOD International Conference on Management of Data, SIGMOD 2008, Vancouver, BC, Canada, June 10-12, 2008, pp. 107-120, 2008, ACM, 978-1-60558-102-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
m-invariance, dynamic anonymization, privacy, statistical database |
28 | Wolfgang Hommel |
Using Policy-Based Management for Privacy-Enhancing Data Access and Usage Control in Grid Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCGRID ![In: 8th IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2008), 19-22 May 2008, Lyon, France, pp. 621-626, 2008, IEEE Computer Society, 978-0-7695-3156-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Privacy, Grid, XACML, Policy-based Management |
28 | Pairat Thorncharoensri, Willy Susilo, Yi Mu 0001 |
How to Balance Privacy with Authenticity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2008, 11th International Conference, Seoul, Korea, December 3-5, 2008, Revised Selected Papers, pp. 184-201, 2008, Springer, 978-3-642-00729-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
universal designated verifier signature schemes, one time, non-transferability, privacy, authenticity |
Displaying result #501 - #600 of 63336 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ 14][ 15][ >>] |
|