Searched for: +
(1 - 20 of 33)

Pages

A boolean QPQ using single photons
A boolean QPQ using single photons
Understanding Security and Privacy Characteristics ofHybrid-based IP-ICN Coexistence Architectures
Understanding Security and Privacy Characteristics ofHybrid-based IP-ICN Coexistence Architectures
RFID Guardian Prototype
RFID Guardian Prototype
A Survey on the Privacy-Preserving Applications of Secure Transformation in Collaborative Supply Chains
A Survey on the Privacy-Preserving Applications of Secure Transformation in Collaborative Supply Chains
Blockchain-based solutions for privacy in the Internet of Things Smart Environment
Blockchain-based solutions for privacy in the Internet of Things Smart Environment
Identification of subjects from reconstructed images
Identification of subjects from reconstructed images: Identification of individual subjects based on image reconstructions generated from fMRI brain scans
Security and Privacy of Overlay-based ICN/IPCoexistence Approaches
Security and Privacy of Overlay-based ICN/IPCoexistence Approaches
Sense Umbrella Connection and Desensitisation
Sense Umbrella Connection and Desensitisation: Weather Witness
Evaluating  Explanations for different Relationship Strengths
Evaluating Explanations for different Relationship Strengths
Privacy-Preserving Data Aggregation in Peer-to-Peer Network
Privacy-Preserving Data Aggregation in Peer-to-Peer Network: A Multiparty Computation Approach
Tracking Cookies in the European Union, an Empirical Analysis of the Current Situation
Tracking Cookies in the European Union, an Empirical Analysis of the Current Situation
Measuring Polkadot
Measuring Polkadot: The Impact of Tor and a VPN on Polkadot's Performance and Security
Reverse Engineering of Web Cookies
Reverse Engineering of Web Cookies: When is too late for your private data?
Mitigating Inference Attacks in Collaborative Credit Card Fraud Detection using Secure Multi-Party Selection
Mitigating Inference Attacks in Collaborative Credit Card Fraud Detection using Secure Multi-Party Selection
A Human-Machine Approach to Preserve Privacy in Image Analysis Crowdsourcing Tasks
A Human-Machine Approach to Preserve Privacy in Image Analysis Crowdsourcing Tasks
Practical Privacy Preserving k-Nearest Neighbour in Outsourced Environments
Practical Privacy Preserving k-Nearest Neighbour in Outsourced Environments
PRECLUDE: PRivacy-prEserving Collaborative Learning Using a Decentralised Ensemble approach
PRECLUDE: PRivacy-prEserving Collaborative Learning Using a Decentralised Ensemble approach
Do they really value your privacy?
Do they really value your privacy?: An exploratory analysis of what can be learned about companies from their privacy statements
A distributed approach to improve inland water transportation addressing privacy and incremental improvements
A distributed approach to improve inland water transportation addressing privacy and incremental improvements
Hierarchical Query Mechanisms for Searchable Encrypted Databases
Hierarchical Query Mechanisms for Searchable Encrypted Databases
Searched for: +
(1 - 20 of 33)

Pages