Skip to main content
TudRepo
Research repository
Education Repository
Cultural Heritage
About
·
How to search
Include full text
Search results
Back
Searched for: +
(1 - 20 of 33)
Document type
Date
Pages
1
2
List view
Grid view
Print
Email
export CSV
export Excel
Hierarchical Query Mechanisms for Searchable Encrypted Databases
RFID Guardian Prototype
A boolean QPQ using single photons
HUMAN WASTE, WHAT A DRAG!: Redesign transporting and the handling of Thetford’s waste-holding tank
Sense Umbrella Connection and Desensitisation: Weather Witness
Privacy-Preserving Data Aggregation in Peer-to-Peer Network: A Multiparty Computation Approach
Surveillance/Intimacy: Shifts in spaces - transformations of realities
PRECLUDE: PRivacy-prEserving Collaborative Learning Using a Decentralised Ensemble approach
Tracking Cookies in the European Union, an Empirical Analysis of the Current Situation
Towards a New Prison: Facilitating the cyber crime threat
Road-user participation in vehicle-data sharing systems: for the purpose of dynamic traffic management
A Human-Machine Approach to Preserve Privacy in Image Analysis Crowdsourcing Tasks
Evaluating Explanations for different Relationship Strengths
Do they really value your privacy?: An exploratory analysis of what can be learned about companies from their privacy statements
Privacy-Preserving Data Aggregation with Probabilistic Range Validation
Mitigating Inference Attacks in Collaborative Credit Card Fraud Detection using Secure Multi-Party Selection
Understanding Security and Privacy Characteristics ofHybrid-based IP-ICN Coexistence Architectures
A Survey on the Privacy-Preserving Applications of Secure Transformation in Collaborative Supply Chains
Blockchain-based solutions for privacy in the Internet of Things Smart Environment
Security and Privacy of Overlay-based ICN/IPCoexistence Approaches
Searched for: +
(1 - 20 of 33)
Document type
Date
Pages
1
2
List view
Grid view
Print
Email
export CSV
export Excel