Searched for: +
(1 - 20 of 32)

Pages

Evaluating  Explanations for different Relationship Strengths
Evaluating Explanations for different Relationship Strengths
Privacy-Preserving Data Aggregation in Peer-to-Peer Network
Privacy-Preserving Data Aggregation in Peer-to-Peer Network: A Multiparty Computation Approach
Tracking Cookies in the European Union, an Empirical Analysis of the Current Situation
Tracking Cookies in the European Union, an Empirical Analysis of the Current Situation
Measuring Polkadot
Measuring Polkadot: The Impact of Tor and a VPN on Polkadot's Performance and Security
Reverse Engineering of Web Cookies
Reverse Engineering of Web Cookies: When is too late for your private data?
Mitigating Inference Attacks in Collaborative Credit Card Fraud Detection using Secure Multi-Party Selection
Mitigating Inference Attacks in Collaborative Credit Card Fraud Detection using Secure Multi-Party Selection
A Human-Machine Approach to Preserve Privacy in Image Analysis Crowdsourcing Tasks
A Human-Machine Approach to Preserve Privacy in Image Analysis Crowdsourcing Tasks
Practical Privacy Preserving k-Nearest Neighbour in Outsourced Environments
Practical Privacy Preserving k-Nearest Neighbour in Outsourced Environments
PRECLUDE: PRivacy-prEserving Collaborative Learning Using a Decentralised Ensemble approach
PRECLUDE: PRivacy-prEserving Collaborative Learning Using a Decentralised Ensemble approach
Do they really value your privacy?
Do they really value your privacy?: An exploratory analysis of what can be learned about companies from their privacy statements
A distributed approach to improve inland water transportation addressing privacy and incremental improvements
A distributed approach to improve inland water transportation addressing privacy and incremental improvements
Hierarchical Query Mechanisms for Searchable Encrypted Databases
Hierarchical Query Mechanisms for Searchable Encrypted Databases
Surveillance/Intimacy
Surveillance/Intimacy: Shifts in spaces - transformations of realities
HUMAN WASTE, WHAT A DRAG!: Redesign transporting and the handling of Thetford’s waste-holding tank
HUMAN WASTE, WHAT A DRAG!: Redesign transporting and the handling of Thetford’s waste-holding tank
Road-user participation in vehicle-data sharing systems
Road-user participation in vehicle-data sharing systems: for the purpose of dynamic traffic management
Towards a New Prison
Towards a New Prison: Facilitating the cyber crime threat
Characterising AI Weakness in Detecting Personal Data from Images By Crowds
Characterising AI Weakness in Detecting Personal Data from Images By Crowds
From Points to Faces: An automotive lidar-based face recognition system
From Points to Faces: An automotive lidar-based face recognition system
Privacy-Preserving Data Aggregation with Probabilistic Range Validation
Privacy-Preserving Data Aggregation with Probabilistic Range Validation
Privacy Analysis of Decentralized Federated Learning
Privacy Analysis of Decentralized Federated Learning
Searched for: +
(1 - 20 of 32)

Pages