|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 11410 occurrences of 3224 keywords
|
|
|
Results
Found 63337 publication records. Showing 63336 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
28 | Khaled Ouafi, Raphael C.-W. Phan |
Privacy of Recent RFID Authentication Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, 4th International Conference, ISPEC 2008, Sydney, Australia, April 21-23, 2008, Proceedings, pp. 263-277, 2008, Springer, 978-3-540-79103-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
privacy, RFID, provably secure, authentication protocols, untraceability |
28 | Thorben Burghardt, Erik Buchmann, Klemens Böhm, Chris Clifton |
Collaborative Search and User Privacy: How Can They Be Reconciled?. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CollaborateCom ![In: Collaborative Computing: Networking, Applications and Worksharing, 4th International Conference, CollaborateCom 2008, Orlando, FL, USA, November 13-16, 2008, Revised Selected Papers, pp. 85-99, 2008, Springer / ICST, 978-3-642-03353-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Privacy, Policy, Collaborative Search |
28 | Daniel Halperin, Thomas S. Heydt-Benjamin, Benjamin Ransford, Shane S. Clark, Benessa Defend, Will Morgan, Kevin Fu, Tadayoshi Kohno, William H. Maisel |
Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SP ![In: 2008 IEEE Symposium on Security and Privacy (SP 2008), 18-21 May 2008, Oakland, California, USA, pp. 129-142, 2008, IEEE Computer Society, 978-0-7695-3168-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
security, privacy, pervasive computing, implantable medical devices, medical safety |
28 | Ling Qiu, Yingjiu Li, Xintao Wu |
Preserving privacy in association rule mining with bloom filters. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Intell. Inf. Syst. ![In: J. Intell. Inf. Syst. 29(3), pp. 253-278, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Association rule mining, Bloom filters, Privacy preserving |
28 | Charalampos Z. Patrikakis, Pantelis N. Karamolegkos, Athanasios Voulodimos, Mohd Helmy Abd Wahab, Nik Shahidah Afifi Mohd Taujuddin, Christina Hanif, Linda Pareschi, Daniele Riboni, Stefan G. Weber, Andreas Heinemann, Sen-Ching S. Cheung, Jayahsri Chaudhari, Jithendra K. Paruchuri |
Security and Privacy in Pervasive Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Pervasive Comput. ![In: IEEE Pervasive Comput. 6(4), pp. 73-75, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
technology awareness, context-aware mobile services, electronic data, k-anonymity techniques, attestation services, pitch shifting, voice morphing, security, privacy, pervasive computing, encryption, user needs, speaker identification, sensing technology, e-passport |
28 | Fengjun Li, Bo Luo, Peng Liu 0005, Dongwon Lee 0001, Chao-Hsien Chu |
Automaton segmentation: a new approach to preserve privacy in xml information brokering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2007 ACM Conference on Computer and Communications Security, CCS 2007, Alexandria, Virginia, USA, October 28-31, 2007, pp. 508-518, 2007, ACM, 978-1-59593-703-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
privacy, access control, xml |
28 | Waseem Ahmad, Ashfaq A. Khokhar |
An Architecture for Privacy Preserving Collaborative Filtering on Web Portals. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proceedings of the Third International Symposium on Information Assurance and Security, IAS 2007, August 29-31, 2007, Manchester, United Kingdom, pp. 273-278, 2007, IEEE Computer Society, 978-0-7695-2876-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Threshold Homomorphic Cryptosystems, Collaborative Filtering, Biclustering, Privacy Enhancing Technologies, Crossing Minimization |
28 | Kim-Phuong L. Vu, Fredrick P. Garcia, Deborah Nelson, John Sulaitis, Beth Creekmur, Vanessa Chambers, Robert W. Proctor |
Examining User Privacy Practices While Shopping Online: What Are Users Looking for? ![Search on Bibsonomy](Pics/bibsonomy.png) |
HCI (9) ![In: Human Interface and the Management of Information. Interacting in Information Environments, Symposium on Human Interface 2007, Held as Part of HCI International 2007, Beijing, China, July 22-27, 2007, Proceedings, Part II, pp. 792-801, 2007, Springer, 978-3-540-73353-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
usability, e-commerce, eye-tracking, privacy policies |
28 | Huseyin Polat 0001, Wenliang Du |
Effects of inconsistently masked data using RPT on CF with privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2007 ACM Symposium on Applied Computing (SAC), Seoul, Korea, March 11-15, 2007, pp. 649-653, 2007, ACM, 1-59593-480-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
CF, RPT, inconsistently perturbed data, privacy, accuracy |
28 | Tomasz Zukowski, Irwin Brown |
Examining the influence of demographic factors on internet users' information privacy concerns. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAICSIT ![In: Proceedings of the 2007 Annual Conference of the South African Institute of Computer Scientists and Information Technologists on IT Research in Developing Countries, SAICSIT 2007, Port Elizabeth, South Africa, October 2-3, 2007, pp. 197-204, 2007, ACM, 978-1-59593-775-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
demographic factors, information privacy concerns, internet |
28 | Jianming Yong |
Enhancing the Privacy of e-Learning Systems with Alias and Anonymity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSCWD (Selected Papers) ![In: Computer Supported Cooperative Work in Design IV, 11th International Conference, CSCWD 2007, Melbourne, Australia, April 26-28, 2007. Revised Selected Papers, pp. 534-544, 2007, Springer, 978-3-540-92718-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
e-Learning, Privacy Preservation, Digital Identity |
28 | Chen Yongxi |
Crisis of personal data protection during the construction of e-government: reaction and limits of Hong Kong privacy laws. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEGOV ![In: Proceedings of the 1st International Conference on Theory and Practice of Electronic Governance, ICEGOV 2007, Macao, China, December 10-13, 2007, pp. 155-164, 2007, ACM, 978-1-59593-822-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
legal deficiency, personal data protection, privacy law, e-government, Hong Kong |
28 | Shlomo Berkovsky, Yaniv Eytani, Tsvi Kuflik, Francesco Ricci 0001 |
Enhancing privacy and preserving accuracy of a distributed collaborative filtering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RecSys ![In: Proceedings of the 2007 ACM Conference on Recommender Systems, RecSys 2007, Minneapolis, MN, USA, October 19-20, 2007, pp. 9-16, 2007, ACM, 978-1-59593-730-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
privacy, recommender systems, collaborative filtering |
28 | Giorgos Karopoulos, Georgios Kambourakis, Stefanos Gritzalis |
Two privacy enhanced context transfer schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Q2SWinet ![In: Q2SWinet'07 - Proceedings of the Third ACM Workshop on Q2S and Security for Wireless and Mobile Networks, Chania, Crete Island, Greece, October 22, 2007, pp. 172-175, 2007, ACM, 978-1-59593-806-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
network access identifier, secure handover, privacy, context transfer, all-IP networks |
28 | Weijiang Xu, Weiwei Jing, Liusheng Huang, Yifei Yao |
Privacy-preserving collision detection of two circles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Infoscale ![In: Proceedings of the 2nf International Conference on Scalable Information Systems, Infoscale 2007, Suzhou, China, June 6-8, 2007, pp. 73, 2007, ACM, 978-1-59593-757-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
collision detection, privacy-preserving, secure multi-party computation |
28 | Rachel Greenstadt, Barbara J. Grosz, Michael D. Smith 0001 |
SSDPOP: improving the privacy of DCOP with secret sharing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAMAS ![In: 6th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2007), Honolulu, Hawaii, USA, May 14-18, 2007, pp. 171, 2007, IFAAMAS, 978-81-904262-7-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
privacy, constraint reasoning, DCOP |
28 | Florian Kerschbaum |
Distance-preserving pseudonymization for timestamps and spatial data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WPES ![In: Proceedings of the 2007 ACM Workshop on Privacy in the Electronic Society, WPES 2007, Alexandria, VA, USA, October 29, 2007, pp. 68-71, 2007, ACM, 978-1-59593-883-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
privacy, hash functions, pseudonymization, distributed intrusion detection |
28 | Gordana Dodig-Crnkovic, Virginia Horniak |
Togetherness and respect: ethical concerns of privacy in Global Web Societies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AI Soc. ![In: AI Soc. 20(3), pp. 372-383, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Cyberethics, E-polis ethics, Legitimate by design, Disclosive ethics, Intentional design for democracy, Privacy |
28 | Shuting Xu, Jun Zhang 0001, Dianwei Han, Jie Wang 0008 |
Singular value decomposition based data distortion strategy for privacy protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Knowl. Inf. Syst. ![In: Knowl. Inf. Syst. 10(3), pp. 383-397, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Data distortion, Security, Data mining, Singular value decomposition, Privacy protection |
28 | J. C. Poindexter, Julia Brande Earp, David L. Baumer |
An experimental economics approach toward quantifying online privacy choices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Syst. Frontiers ![In: Inf. Syst. Frontiers 8(5), pp. 363-374, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Security, Internet, Personal privacy |
28 | Charu C. Aggarwal, Jian Pei, Bo Zhang 0002 |
On privacy preservation against adversarial data mining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KDD ![In: Proceedings of the Twelfth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Philadelphia, PA, USA, August 20-23, 2006, pp. 510-516, 2006, ACM, 1-59593-339-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
data mining, association rules, privacy preservation |
28 | Jim Dowd, Shouhuai Xu, Weining Zhang |
Privacy-Preserving Decision Tree Mining Based on Random Substitutions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ETRICS ![In: Emerging Trends in Information and Communication Security, International Conference, ETRICS 2006, Freiburg, Germany, June 6-9, 2006, Proceedings, pp. 145-159, 2006, Springer, 3-540-34640-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
data mining, decision tree, Privacy-preservation, matrix, perturbation |
28 | Giannakis Antoniou, Campbell Wilson, Dimitris Geneiatakis |
PPINA - A Forensic Investigation Protocol for Privacy Enhancing Technologies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Communications and Multimedia Security ![In: Communications and Multimedia Security, 10th IFIP TC-6 TC-11 International Conference, CMS 2006, Heraklion, Crete, Greece, October 19-21, 2006, Proceedings, pp. 185-195, 2006, Springer, 3-540-47820-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Privacy Enhancing Technologies, Network Forensics |
28 | Janice Y. Tsai, Lorrie Faith Cranor, Scott Craver |
Vicarious infringement creates a privacy ceiling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Rights Management Workshop ![In: Proceedings of the Sixth ACM Workshop on Digital Rights Management, Alexandria, VA, USA, October 30, 2006, pp. 9-18, 2006, ACM, 1-59593-555-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
privacy, digital rights management |
28 | Jin Kwak, Keunwoo Rhee, Namje Park, Howon Kim 0001, Seungjoo Kim, Kouichi Sakurai, Dongho Won |
An RFID System Based MCLT System with Improved Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUC Workshops ![In: Emerging Directions in Embedded and Ubiquitous Computing, EUC 2006 Workshops: NCUS, SecUbiq, USN, TRUST, ESO, and MSA, Seoul, Korea, August 1-4, 2006, Proceedings, pp. 579-590, 2006, Springer, 3-540-36850-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
EPC Network, application service, security, privacy, location tracking, RFID system |
28 | Anne H. Anderson |
A comparison of two privacy policy languages: EPAL and XACML. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SWS ![In: Proceedings of the 3rd ACM Workshop On Secure Web Services, SWS 2006, Alexandria, VA, USA, November 3, 2006, pp. 53-60, 2006, ACM, 1-59593-546-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
XACML, privacy policy, policy language, EPAL |
28 | Yingpeng Sang, Hong Shen 0001, Yasuo Tan, Naixue Xiong |
Efficient Protocols for Privacy Preserving Matching Against Distributed Datasets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 8th International Conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings, pp. 210-227, 2006, Springer, 3-540-49496-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
set matching, distributed database, cryptographic protocol, privacy preservation, set intersection |
28 | Balachander Krishnamurthy, Craig E. Wills |
Generating a privacy footprint on the internet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Internet Measurement Conference ![In: Proceedings of the 6th ACM SIGCOMM Internet Measurement Conference, IMC 2006, Rio de Janeriro, Brazil, October 25-27, 2006, pp. 65-70, 2006, ACM, 1-59593-561-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
privacy, web, anonymity |
28 | Rachel Greenstadt, Jonathan P. Pearce, Emma Bowring, Milind Tambe |
Experimental analysis of privacy loss in DCOP algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAMAS ![In: 5th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2006), Hakodate, Japan, May 8-12, 2006, pp. 1424-1426, 2006, ACM, 1-59593-303-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
privacy, constraint reasoning, DCOP |
28 | Keith B. Frikken, Philippe Golle |
Private social network analysis: how to assemble pieces of a graph privately. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WPES ![In: Proceedings of the 2006 ACM Workshop on Privacy in the Electronic Society, WPES 2006, Alexandria, VA, USA, October 30, 2006, pp. 89-98, 2006, ACM, 1-59593-556-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
privacy, social networks, anonymity, graph |
28 | Marco Gruteser, Dirk Grunwald |
Enhancing Location Privacy in Wireless LAN Through Disposable Interface Identifiers: A Quantitative Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mob. Networks Appl. ![In: Mob. Networks Appl. 10(3), pp. 315-325, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
wireless LAN, location privacy |
28 | Matthias Enzmann, Markus Schneider 0002 |
Improving Customer Retention in E-Commerce through a Secure and Privacy-Enhanced Loyalty System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Syst. Frontiers ![In: Inf. Syst. Frontiers 7(4-5), pp. 359-370, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
customer retention, loyalty systems, privacy, e-commerce |
28 | Hui Xiong 0001, Michael S. Steinbach, Vipin Kumar 0001 |
Privacy leakage in multi-relational databases via pattern based semi-supervised learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIKM ![In: Proceedings of the 2005 ACM CIKM International Conference on Information and Knowledge Management, Bremen, Germany, October 31 - November 5, 2005, pp. 355-356, 2005, ACM, 1-59593-140-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
semi-supervised learning, database security, privacy preserving data mining, hyperclique patterns |
28 | Mark R. Brown, Udo Gottlieb, Rose Muchira |
Privacy Concerns and Purchase of Travel Product Online. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ENTER ![In: Information and Communication Technologies in Tourism, ENTER 2005, Proceedings of the International Conference in Innsbruck, Austria, 2005, pp. 285-295, 2005, Springer, 978-3-211-24148-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
relationship marketing, Internet, privacy, trust, travel |
28 | Huseyin Polat 0001, Wenliang Du |
SVD-based collaborative filtering with privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2005 ACM Symposium on Applied Computing (SAC), Santa Fe, New Mexico, USA, March 13-17, 2005, pp. 791-795, 2005, ACM, 1-58113-964-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
privacy, collaborative filtering, SVD, randomization |
28 | Anour F. A. Dafa-Alla, Eun Hee Kim, Keun Ho Ryu, Yong Jun Heo |
PRBAC: An Extended Role Based Access Control for Privacy Preserving Data Mining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACIS-ICIS ![In: 4th Annual ACIS International Conference on Computer and Information Science (ICIS 2005), 14-16 July 2005, Jeju Island, South Korea, pp. 68-73, 2005, IEEE Computer Society, 0-7695-2296-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
RBAC, Privacy preserving data mining |
28 | Alan R. Peslak |
Privacy policies of the largest privately held companies: a review and analysis of the forbes private 50. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CPR ![In: Proceedings of the 2005 ACM SIGMIS CPR conference on Computer personnel research 2005, Atlanta, Georgia, USA, April 14-16, 2005, pp. 104-111, 2005, ACM, 1-59593-011-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
fair information practices, private companies, privately held companies, privacy policies |
28 | Tran Khanh Dang |
Privacy-Preserving Search and Updates for Outsourced Tree-Structured Data on Untrusted Servers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
iTrust ![In: Trust Management, Third International Conference, iTrust 2005, Paris, France, May 23-26, 2005, Proceedings, pp. 338-354, 2005, Springer, 3-540-26042-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Outsourced search trees, data and user privacy, oblivious search and updates, encrypted data, untrusted servers |
28 | Sameer Patil, Jennifer Lai |
Who gets to know what when: configuring privacy permissions in an awareness application. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI ![In: Proceedings of the 2005 Conference on Human Factors in Computing Systems, CHI 2005, Portland, Oregon, USA, April 2-7, 2005, pp. 101-110, 2005, ACM, 1-58113-998-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
contextual communication, permission structures, privacy, awareness, context-aware computing, information disclosure |
28 | Wei Jiang, Chris Clifton |
Privacy-Preserving Distributed k-Anonymity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DBSec ![In: Data and Applications Security XIX, 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005, Proceedings, pp. 166-177, 2005, Springer, 3-540-28138-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
security, privacy, k-anonymity |
28 | Kenichi Yabuta, Hitoshi Kitazawa, Toshihisa Tanaka |
A New Concept of Security Camera Monitoring with Privacy Protection by Masking Moving Objects. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PCM (1) ![In: Advances in Multimedia Information Processing - PCM 2005, 6th Pacific-Rim Conference on Multimedia, Jeju Island, Korea, November 13-16, 2005, Proceedings, Part I, pp. 831-842, 2005, Springer, 3-540-30027-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
security camera, JPEG encoding, watermarking, Privacy protection |
28 | Carson Reynolds, Rosalind W. Picard |
Affective sensors, privacy, and ethical contracts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI Extended Abstracts ![In: Extended abstracts of the 2004 Conference on Human Factors in Computing Systems, CHI 2004, Vienna, Austria, April 24 - 29, 2004, pp. 1103-1106, 2004, ACM, 1-58113-703-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
contractualism, privacy, sensors, affective computing, ethics, emotion recognition |
28 | Dawn N. Jutla, Peter Bodorik, Deyun Gao |
Management of Private Data: Addressing User Privacy and Economic, Social, and Ethical Concerns. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secure Data Management ![In: Secure Data Management, VLDB 2004 Workshop, SDM 2004, Toronto, Canada, August 30, 2004, Proceedings, pp. 100-117, 2004, Springer, 3-540-22983-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Privacy Web Services, Private Data Management, P3P |
28 | Rüdiger Grimm, Patrick Aichroth |
Privacy protection for signed media files: a separation-of-duty approach to the lightweight DRM (LWDRM) system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MM&Sec ![In: Proceedings of the 6th workshop on Multimedia & Security, MM&Sec 2004, Magdeburg, Germany, September 20-21, 2004, pp. 93-99, 2004, ACM, 1-58113-854-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
LWDRM, light weight digital rights management, virtual goods, privacy, pseudonyms, separation of duty |
28 | Alessandro Acquisti |
Privacy in electronic commerce and the economics of immediate gratification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EC ![In: Proceedings 5th ACM Conference on Electronic Commerce (EC-2004), New York, NY, USA, May 17-20, 2004, pp. 21-29, 2004, ACM, 1-58113-771-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
hyperbolic discounting, immediate gratification, self-control problems, privacy, electronic commerce |
28 | Bok-Nyong Park, Jae-Won Kim, Wonjun Lee 0001 |
PrecePt: A Privacy-Enhancing License Management Protocol for Digital Rights Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA (1) ![In: 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 29-31 March 2004, Fukuoka, Japan, pp. 574-579, 2004, IEEE Computer Society, 0-7695-2051-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
License Management Protocol, Privacy, Anonymity, Public-Key Cryptosystem, DRM |
28 | Ari Juels, John G. Brainard |
Soft blocking: flexible blocker tags on the cheap. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WPES ![In: Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society, WPES 2004, Washington, DC, USA, October 28, 2004, pp. 1-7, 2004, ACM, 1-58113-968-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
blocker tags, tree-walking, privacy, RFID tags, ALOHA |
28 | Marco Gruteser, Dirk Grunwald |
Enhancing location privacy in wireless LAN through disposable interface identifiers: a quantitative analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WMASH ![In: Proceedings of the 1st ACM International Workshop on Wireless Mobile Applications and Services on WLAN Hotspots, WMASH 2003, San Diego, CA, USA, September 19, 2003, pp. 46-55, 2003, ACM, 1-58113-768-0. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
interface identifiers, wireless LAN, location privacy |
28 | Desney S. Tan, Mary Czerwinski |
Information voyeurism: social impact of physically large displays on information privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI Extended Abstracts ![In: Extended abstracts of the 2003 Conference on Human Factors in Computing Systems, CHI 2003, Ft. Lauderdale, Florida, USA, April 5-10, 2003, pp. 748-749, 2003, ACM, 1-58113-637-4. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
implicit memory, privacy, large displays, social factors |
28 | Andrew M. Odlyzko |
Privacy, economics, and price discrimination on the Internet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEC ![In: Proceedings of the 5th International Conference on Electronic Commerce, ICEC 2003, Pittsburgh, Pennsylvania, USA, September 30 - October 03, 2003, pp. 355-366, 2003, ACM, 1-58113-788-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Internet and railroads, privacy, price discrimination |
28 | Chris Clifton, Murat Kantarcioglu, Jaideep Vaidya, Xiaodong Lin 0004, Michael Y. Zhu |
Tools for Privacy Preserving Data Mining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGKDD Explor. ![In: SIGKDD Explor. 4(2), pp. 28-34, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
security, privacy |
28 | Martin S. Olivier |
Database Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGKDD Explor. ![In: SIGKDD Explor. 4(2), pp. 20-27, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
dataveillance, integrity, availability, confidentiality, personal data, database privacy |
28 | Vijay S. Iyengar |
Transforming data to satisfy privacy constraints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KDD ![In: Proceedings of the Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, July 23-26, 2002, Edmonton, Alberta, Canada, pp. 279-288, 2002, ACM, 1-58113-567-X. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
suppression, privacy, generalization, predictive modeling, data transformation |
28 | Tsan-sheng Hsu, Churn-Jung Liau, Da-Wei Wang 0004, Jeremy K.-P. Chen |
Quantifying Privacy Leakage through Answering Database Queries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 5th International Conference, ISC 2002 Sao Paulo, Brazil, September 30 - October 2, 2002, Proceedings, pp. 162-176, 2002, Springer, 3-540-44270-7. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Value of information, Privacy, Data table, Quantitative model, Decision logic |
28 | John F. Canny |
Collaborative filtering with privacy via factor analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGIR ![In: SIGIR 2002: Proceedings of the 25th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, August 11-15, 2002, Tampere, Finland, pp. 238-245, 2002, ACM, 1-58113-561-0. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
privacy, CSCW, recommender systems, personalization, collaborative filtering, surveys, missing data, sparse |
28 | Giles Hogben, Tom Jackson, Marc Wilikens |
A Fully Compliant Research Implementation of the P3P Standard for Privacy Protection: Experiences and Recommendations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2002, 7th European Symposium on Research in Computer Security, Zurich, Switzerland, October 14-16, 2002, Proceedings, pp. 104-125, 2002, Springer, 3-540-44345-2. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
XML Digital Signatures, P3P, transaction management, privacy enhancing technologies, security verification, secure electronic commerce |
28 | Valeri Korjik, Guillermo Morales-Luna, Vladimir B. Balakirsky |
Privacy Amplification Theorem for Noisy Main Channel. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 4th International Conference, ISC 2001, Malaga, Spain, October 1-3, 2001, Proceedings, pp. 18-26, 2001, Springer, 3-540-42662-0. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Key-sharing, Rènyi information, error correcting codes, hashing, privacy amplification |
28 | Steven R. Johnston |
The Impact of Privacy and Data Protection Legislation on the Sharing of Intrusion Detection Information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Recent Advances in Intrusion Detection ![In: Recent Advances in Intrusion Detection, 4th International Symposium, RAID 2001 Davis, CA, USA, October 10-12, 2001, Proceedings, pp. 150-171, 2001, Springer, 3-540-42702-3. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
trans-border data flow, intrusion detection. (c) Her Majesty the Queen as represented by the Minister of National Defence, acting on behalf of the Communications Security Establishment, 2001, Privacy, data protection, personal information, personal data, Canada |
28 | Frank McSherry, Ratul Mahajan |
Differentially-private network trace analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCOMM ![In: Proceedings of the ACM SIGCOMM 2010 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, New Delhi, India, August 30 -September 3, 2010, pp. 123-134, 2010, ACM, 978-1-4503-0201-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
trace analysis, differential privacy |
28 | Noman Mohammed, Benjamin C. M. Fung, Patrick C. K. Hung, Cheuk-kwong Lee |
Anonymizing healthcare data: a case study on the blood transfusion service. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KDD ![In: Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Paris, France, June 28 - July 1, 2009, pp. 1285-1294, 2009, ACM, 978-1-60558-495-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
classification, privacy, anonymity, healthcare |
28 | Yang Ye, Qiao Deng, Chi Wang 0001, Dapeng Lv, Yu Liu 0068, Jianhua Feng |
BSGI: An Effective Algorithm towards Stronger l-Diversity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA ![In: Database and Expert Systems Applications, 19th International Conference, DEXA 2008, Turin, Italy, September 1-5, 2008. Proceedings, pp. 19-32, 2008, Springer, 978-3-540-85653-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
BSGI, Unique-Distinct l-diversity, Privacy preservation, k-anonymity, l-diversity |
28 | Gabriel Ghinita, Panos Kalnis, Ali Khoshgozaran, Cyrus Shahabi, Kian-Lee Tan |
Private queries in location based services: anonymizers are not necessary. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMOD Conference ![In: Proceedings of the ACM SIGMOD International Conference on Management of Data, SIGMOD 2008, Vancouver, BC, Canada, June 10-12, 2008, pp. 121-132, 2008, ACM, 978-1-60558-102-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
query privacy, private information retrieval, location anonymity |
28 | Sheng Zhong 0002, Yang Richard Yang |
Verifiable Distributed Oblivious Transfer and Mobile Agent Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mob. Networks Appl. ![In: Mob. Networks Appl. 11(2), pp. 201-210, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
privacy, mobile agent, oblivious transfer, verifiable secret sharing |
28 | Fabio Massacci, John Mylopoulos, Nicola Zannone |
Hierarchical hippocratic databases with minimal disclosure for virtual organizations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VLDB J. ![In: VLDB J. 15(4), pp. 370-387, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Minimal disclosure, Private data management, Access control, Information security, Virtual organizations, Delegation, Privacy protection |
28 | Changjie Wang, Ho-fung Leung |
A secure and private clarke tax voting protocol without trusted authorities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEC ![In: Proceedings of the 6th International Conference on Electronic Commerce, ICEC 2004, Delft, The Netherlands, October 25-27, 2004, pp. 556-565, 2004, ACM, 1-58113-930-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Clarke tax voting protocol, universal verification, security, privacy protection, electronic voting, mix network, ElGamal encryption |
27 | George Drosatos, Pavlos S. Efraimidis |
A privacy-preserving protocol for finding the nearest doctor in an emergency. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PETRA ![In: Proceedings of the 3rd International Conference on Pervasive Technologies Related to Assistive Environments, PETRA 2010, Samos, Greece, June 23-25, 2010, 2010, ACM, 978-1-4503-0071-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
peer-to-peer network, location privacy, personal data, privacy-preserving protocol |
27 | Balachander Krishnamurthy, Craig E. Wills |
Privacy diffusion on the web: a longitudinal perspective. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW ![In: Proceedings of the 18th International Conference on World Wide Web, WWW 2009, Madrid, Spain, April 20-24, 2009, pp. 541-550, 2009, ACM, 978-1-60558-487-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
privacy, privacy enhancing technologies |
27 | Isaac Cano, Guillermo Navarro-Arribas, Vicenç Torra |
A new framework to automate constrained microaggregation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIKM-PAVLAD ![In: Proceeding of the ACM First International Workshop on Privacy and Anonymity for Very Large Databases, CIKM-PAVLAD 2009, Hong Kong, China, November 6, 2009, pp. 1-8, 2009, ACM. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
microaggregation with constraints, privacy preserving data mining, data privacy, microaggregation, data editing |
27 | Aleksandra Korolova, Rajeev Motwani 0001, Shubha U. Nabar, Ying Xu 0002 |
Link privacy in social networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIKM ![In: Proceedings of the 17th ACM Conference on Information and Knowledge Management, CIKM 2008, Napa Valley, California, USA, October 26-30, 2008, pp. 289-298, 2008, ACM, 978-1-59593-991-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
link privacy, privacy in data mining, social networks, anonymization, link analysis |
27 | Enkh-Amgalan Baatarjav, Ram Dantu, Santi Phithakkitnukoon |
Privacy Management for Facebook. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, 4th International Conference, ICISS 2008, Hyderabad, India, December 16-20, 2008. Proceedings, pp. 273-286, 2008, Springer, 978-3-540-89861-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Privacy, Social network, Facebook, Privacy management |
27 | Thomas W. Lauer, Xiaodong Deng |
Building online trust through privacy practices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 6(5), pp. 323-331, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Privacy practices, Trust, Trustworthiness, Privacy policy |
27 | Lorrie Faith Cranor |
P3P: Making Privacy Policies More Useful. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 1(6), pp. 50-55, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
XML, privacy, privacy policy, P3P |
27 | Jean-Marc Seigneur, Christian Damsgaard Jensen |
Privacy Recovery with Disposable Email Addresses. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 1(6), pp. 35-39, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Privacy recovery, disposable email address, cost-benefit of privacy protection, spam |
27 | Giuseppe Ateniese, Breno de Medeiros |
Anonymous E-prescriptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WPES ![In: Proceedings of the 2002 ACM Workshop on Privacy in the Electronic Society, WPES 2002, Washington, DC, USA, November 21, 2002, pp. 19-31, 2002, ACM, 1-58113-633-1. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
medical information privacy, privacy-preserving cryptographic techniques, public-key cryptography |
27 | Andris Ambainis, Markus Jakobsson, Helger Lipmaa |
Cryptographic Randomized Response Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2004, 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004, pp. 425-438, 2004, Springer, 3-540-21018-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
randomized response technique, privacy, privacy-preserving data-mining, oblivious transfer, polling, binary symmetric channel |
27 | Ann-Kristin Lieberknecht |
Educating Parents in Managing Online Privacy Risks: Media Educators' Perspectives. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy and Identity Management ![In: Privacy and Identity Management. Sharing in a Digital World - 18th IFIP WG 9.2, 9.6/11.7, 11.6 International Summer School, Privacy and Identity 2023, Oslo, Norway, August 8-11, 2023, Revised Selected Papers, pp. 114-126, 2023, Springer, 978-3-031-57977-6. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
27 | Mahdi Akil, Sujash Naskar, Leonardo A. Martucci, Jaap-Henk Hoepman |
A Privacy-Preserving Approach to Vehicle Renting and Driver Accountability in VANETs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy and Identity Management ![In: Privacy and Identity Management. Sharing in a Digital World - 18th IFIP WG 9.2, 9.6/11.7, 11.6 International Summer School, Privacy and Identity 2023, Oslo, Norway, August 8-11, 2023, Revised Selected Papers, pp. 192-210, 2023, Springer, 978-3-031-57977-6. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
27 | Piero Romare |
User-Driven Privacy Factors in Trigger-Action Apps: A Comparative Analysis with General IoT. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy and Identity Management ![In: Privacy and Identity Management. Sharing in a Digital World - 18th IFIP WG 9.2, 9.6/11.7, 11.6 International Summer School, Privacy and Identity 2023, Oslo, Norway, August 8-11, 2023, Revised Selected Papers, pp. 244-264, 2023, Springer, 978-3-031-57977-6. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
27 | Felix Hermsen, Avikarsha Mandal |
Privacy and Utility Evaluation of Synthetic Tabular Data for Machine Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy and Identity Management ![In: Privacy and Identity Management. Sharing in a Digital World - 18th IFIP WG 9.2, 9.6/11.7, 11.6 International Summer School, Privacy and Identity 2023, Oslo, Norway, August 8-11, 2023, Revised Selected Papers, pp. 265-281, 2023, Springer, 978-3-031-57977-6. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
27 | Mehdi Akbari Gurabi, Felix Hermsen, Avikarsha Mandal, Stefan Decker |
Towards Privacy-Preserving Machine Learning in Sovereign Data Spaces: Opportunities and Challenges. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy and Identity Management ![In: Privacy and Identity Management. Sharing in a Digital World - 18th IFIP WG 9.2, 9.6/11.7, 11.6 International Summer School, Privacy and Identity 2023, Oslo, Norway, August 8-11, 2023, Revised Selected Papers, pp. 158-174, 2023, Springer, 978-3-031-57977-6. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
27 | Malte Hansen, Andre Büttner |
Secure and Privacy-Preserving Authentication for Data Subject Rights Enforcement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy and Identity Management ![In: Privacy and Identity Management. Sharing in a Digital World - 18th IFIP WG 9.2, 9.6/11.7, 11.6 International Summer School, Privacy and Identity 2023, Oslo, Norway, August 8-11, 2023, Revised Selected Papers, pp. 175-191, 2023, Springer, 978-3-031-57977-6. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
27 | Liina Kamm, Dan Bogdanov, Eduardo Brito, Andre Ostrak |
Blueprints for Deploying Privacy Enhancing Technologies in E-Government. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy and Identity Management ![In: Privacy and Identity Management. Sharing in a Digital World - 18th IFIP WG 9.2, 9.6/11.7, 11.6 International Summer School, Privacy and Identity 2023, Oslo, Norway, August 8-11, 2023, Revised Selected Papers, pp. 3-19, 2023, Springer, 978-3-031-57977-6. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
27 | Vera Schmitt, Paul Michel dit Ferrer, Arooj Anwar Khan, Ina Kern, Sebastian Möller 0001 |
How Much is Your Instagram Data Worth? Economic Perspective of Privacy in the Social Media Context. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy and Identity Management ![In: Privacy and Identity Management. Sharing in a Digital World - 18th IFIP WG 9.2, 9.6/11.7, 11.6 International Summer School, Privacy and Identity 2023, Oslo, Norway, August 8-11, 2023, Revised Selected Papers, pp. 292-308, 2023, Springer, 978-3-031-57977-6. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
27 | Shokofeh VahidianSadegh, Lena Wiese, Michael Brenner 0003 |
SeCCA: Towards Privacy-Preserving Biclustering Algorithm with Homomorphic Encryptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy and Identity Management ![In: Privacy and Identity Management - 17th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Privacy and Identity 2022, Virtual Event, August 30 - September 2, 2022, Proceedings, pp. 198-213, 2022, Springer, 978-3-031-31970-9. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
27 | Christian Buggedei |
How to Build Organisations for Privacy-Friendly Solutions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy and Identity Management ![In: Privacy and Identity Management - 17th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Privacy and Identity 2022, Virtual Event, August 30 - September 2, 2022, Proceedings, pp. 3-7, 2022, Springer, 978-3-031-31970-9. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
27 | Jesús García Rodríguez, David Goodman, Stephan Krenn, Vasia Liagkou, Rafael Torres Moreno |
From Research to Privacy-Preserving Industry Applications - Workshop Summary. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy and Identity Management ![In: Privacy and Identity Management - 17th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Privacy and Identity 2022, Virtual Event, August 30 - September 2, 2022, Proceedings, pp. 21-33, 2022, Springer, 978-3-031-31970-9. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
27 | Michael Khavkin, Eran Toch |
Valuation of Differential Privacy Budget in Data Trade: A Conjoint Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy and Identity Management ![In: Privacy and Identity Management - 17th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Privacy and Identity 2022, Virtual Event, August 30 - September 2, 2022, Proceedings, pp. 69-84, 2022, Springer, 978-3-031-31970-9. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
27 | Yannic Meier |
Raising Awareness for Privacy Risks and Supporting Protection in the Light of Digital Inequalities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy and Identity Management ![In: Privacy and Identity Management - 17th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Privacy and Identity 2022, Virtual Event, August 30 - September 2, 2022, Proceedings, pp. 44-51, 2022, Springer, 978-3-031-31970-9. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
27 | Simone Fischer-Hübner, Marit Hansen, Jaap-Henk Hoepman, Meiko Jensen |
Privacy-Enhancing Technologies and Anonymisation in Light of GDPR and Machine Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy and Identity Management ![In: Privacy and Identity Management - 17th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Privacy and Identity 2022, Virtual Event, August 30 - September 2, 2022, Proceedings, pp. 11-20, 2022, Springer, 978-3-031-31970-9. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
27 | Ana Fernández Inguanzo |
Privacy and Data Protection in the Era of Recommendation Systems: A Postphenomenological Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy and Identity Management ![In: Privacy and Identity Management - 17th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Privacy and Identity 2022, Virtual Event, August 30 - September 2, 2022, Proceedings, pp. 133-147, 2022, Springer, 978-3-031-31970-9. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
27 | Ramona Schmidt, Ina Schiering |
Gamification in mHealth - Opportunities and Privacy Risks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy and Identity Management ![In: Privacy and Identity Management. Between Data Protection and Security - 16th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Privacy and Identity 2021, Virtual Event, August 16-20, 2021, Revised Selected Papers, pp. 142-159, 2021, Springer, 978-3-030-99099-2. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
27 | Rémy Scholler, Oumaïma Alaoui-Ismaïli, Jean-François Couchot, Eric Ballot, Denis Renaud |
Observing Road Freight Traffic from Mobile Network Signalling Data While Respecting Privacy and Business Confidentiality. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy and Identity Management ![In: Privacy and Identity Management. Between Data Protection and Security - 16th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Privacy and Identity 2021, Virtual Event, August 16-20, 2021, Revised Selected Papers, pp. 195-205, 2021, Springer, 978-3-030-99099-2. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
27 | Sebastian Pape 0001 |
Challenges for Designing Serious Games on Security and Privacy Awareness. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy and Identity Management ![In: Privacy and Identity Management. Between Data Protection and Security - 16th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Privacy and Identity 2021, Virtual Event, August 16-20, 2021, Revised Selected Papers, pp. 3-16, 2021, Springer, 978-3-030-99099-2. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
27 | Jorge Bernal Bernabé, Jesús García Rodríguez, Stephan Krenn, Vasia Liagkou, Antonio F. Skarmeta, Rafael Torres |
Privacy-Preserving Identity Management and Applications to Academic Degree Verification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy and Identity Management ![In: Privacy and Identity Management. Between Data Protection and Security - 16th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Privacy and Identity 2021, Virtual Event, August 16-20, 2021, Revised Selected Papers, pp. 33-46, 2021, Springer, 978-3-030-99099-2. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
27 | Elias Grünewald |
Cloud Native Privacy Engineering through DevPrivOps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy and Identity Management ![In: Privacy and Identity Management. Between Data Protection and Security - 16th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Privacy and Identity 2021, Virtual Event, August 16-20, 2021, Revised Selected Papers, pp. 122-141, 2021, Springer, 978-3-030-99099-2. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
27 | Nathanaël Denis, Sophie Chabridon, Maryline Laurent |
Bringing Privacy, Security and Performance to the Internet of Things Through Usage Control and Blockchains. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy and Identity Management ![In: Privacy and Identity Management. Between Data Protection and Security - 16th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Privacy and Identity 2021, Virtual Event, August 16-20, 2021, Revised Selected Papers, pp. 57-72, 2021, Springer, 978-3-030-99099-2. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
27 | Marco Houben, Jo Pierson |
Public Education, Platformization and Cooperative Responsibility: The Case of the Privacy Covenant in the Netherlands. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy and Identity Management ![In: Privacy and Identity Management. Between Data Protection and Security - 16th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Privacy and Identity 2021, Virtual Event, August 16-20, 2021, Revised Selected Papers, pp. 180-194, 2021, Springer, 978-3-030-99099-2. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
27 | Joakim Kävrestad, Allex Hagberg, Robert Roos, Jana Rambusch, Marcus Nohlberg |
Usable Privacy and Security from the Perspective of Cognitive Abilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy and Identity Management ![In: Privacy and Identity Management. Between Data Protection and Security - 16th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Privacy and Identity 2021, Virtual Event, August 16-20, 2021, Revised Selected Papers, pp. 105-121, 2021, Springer, 978-3-030-99099-2. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
27 | Peter Franke, Michael Kreutzer, Hervais Simo |
Privacy-Preserving IDS for In-Vehicle Networks with Local Differential Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy and Identity Management ![In: Privacy and Identity Management: 15th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Maribor, Slovenia, September 21-23, 2020, Revised Selected Papers, pp. 58-77, 2020, Springer, 978-3-030-72465-8. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
27 | Marvin Priedigkeit, Andreas Weich, Ina Schiering |
Learning Analytics and Privacy - Respecting Privacy in Digital Learning Scenarios. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy and Identity Management ![In: Privacy and Identity Management: 15th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Maribor, Slovenia, September 21-23, 2020, Revised Selected Papers, pp. 134-150, 2020, Springer, 978-3-030-72465-8. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
Displaying result #601 - #700 of 63336 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ 14][ 15][ 16][ >>] |
|