Searched for: +
(1 - 20 of 33)

Pages

Hierarchical Query Mechanisms for Searchable Encrypted Databases
Hierarchical Query Mechanisms for Searchable Encrypted Databases
RFID Guardian Prototype
RFID Guardian Prototype
A boolean QPQ using single photons
A boolean QPQ using single photons
HUMAN WASTE, WHAT A DRAG!: Redesign transporting and the handling of Thetford’s waste-holding tank
HUMAN WASTE, WHAT A DRAG!: Redesign transporting and the handling of Thetford’s waste-holding tank
Sense Umbrella Connection and Desensitisation
Sense Umbrella Connection and Desensitisation: Weather Witness
Privacy-Preserving Data Aggregation in Peer-to-Peer Network
Privacy-Preserving Data Aggregation in Peer-to-Peer Network: A Multiparty Computation Approach
Surveillance/Intimacy
Surveillance/Intimacy: Shifts in spaces - transformations of realities
PRECLUDE: PRivacy-prEserving Collaborative Learning Using a Decentralised Ensemble approach
PRECLUDE: PRivacy-prEserving Collaborative Learning Using a Decentralised Ensemble approach
Tracking Cookies in the European Union, an Empirical Analysis of the Current Situation
Tracking Cookies in the European Union, an Empirical Analysis of the Current Situation
Towards a New Prison
Towards a New Prison: Facilitating the cyber crime threat
Road-user participation in vehicle-data sharing systems
Road-user participation in vehicle-data sharing systems: for the purpose of dynamic traffic management
A Human-Machine Approach to Preserve Privacy in Image Analysis Crowdsourcing Tasks
A Human-Machine Approach to Preserve Privacy in Image Analysis Crowdsourcing Tasks
Evaluating  Explanations for different Relationship Strengths
Evaluating Explanations for different Relationship Strengths
Do they really value your privacy?
Do they really value your privacy?: An exploratory analysis of what can be learned about companies from their privacy statements
Privacy-Preserving Data Aggregation with Probabilistic Range Validation
Privacy-Preserving Data Aggregation with Probabilistic Range Validation
Mitigating Inference Attacks in Collaborative Credit Card Fraud Detection using Secure Multi-Party Selection
Mitigating Inference Attacks in Collaborative Credit Card Fraud Detection using Secure Multi-Party Selection
Understanding Security and Privacy Characteristics ofHybrid-based IP-ICN Coexistence Architectures
Understanding Security and Privacy Characteristics ofHybrid-based IP-ICN Coexistence Architectures
A Survey on the Privacy-Preserving Applications of Secure Transformation in Collaborative Supply Chains
A Survey on the Privacy-Preserving Applications of Secure Transformation in Collaborative Supply Chains
Blockchain-based solutions for privacy in the Internet of Things Smart Environment
Blockchain-based solutions for privacy in the Internet of Things Smart Environment
Security and Privacy of Overlay-based ICN/IPCoexistence Approaches
Security and Privacy of Overlay-based ICN/IPCoexistence Approaches
Searched for: +
(1 - 20 of 33)

Pages