Searched for: +
(1 - 20 of 25)

Pages

Hierarchical Query Mechanisms for Searchable Encrypted Databases
Hierarchical Query Mechanisms for Searchable Encrypted Databases
HUMAN WASTE, WHAT A DRAG!: Redesign transporting and the handling of Thetford’s waste-holding tank
HUMAN WASTE, WHAT A DRAG!: Redesign transporting and the handling of Thetford’s waste-holding tank
Privacy-Preserving Data Aggregation in Peer-to-Peer Network
Privacy-Preserving Data Aggregation in Peer-to-Peer Network: A Multiparty Computation Approach
Surveillance/Intimacy
Surveillance/Intimacy: Shifts in spaces - transformations of realities
PRECLUDE: PRivacy-prEserving Collaborative Learning Using a Decentralised Ensemble approach
PRECLUDE: PRivacy-prEserving Collaborative Learning Using a Decentralised Ensemble approach
Tracking Cookies in the European Union, an Empirical Analysis of the Current Situation
Tracking Cookies in the European Union, an Empirical Analysis of the Current Situation
Towards a New Prison
Towards a New Prison: Facilitating the cyber crime threat
Road-user participation in vehicle-data sharing systems
Road-user participation in vehicle-data sharing systems: for the purpose of dynamic traffic management
A Human-Machine Approach to Preserve Privacy in Image Analysis Crowdsourcing Tasks
A Human-Machine Approach to Preserve Privacy in Image Analysis Crowdsourcing Tasks
Evaluating  Explanations for different Relationship Strengths
Evaluating Explanations for different Relationship Strengths
Do they really value your privacy?
Do they really value your privacy?: An exploratory analysis of what can be learned about companies from their privacy statements
Privacy-Preserving Data Aggregation with Probabilistic Range Validation
Privacy-Preserving Data Aggregation with Probabilistic Range Validation
Mitigating Inference Attacks in Collaborative Credit Card Fraud Detection using Secure Multi-Party Selection
Mitigating Inference Attacks in Collaborative Credit Card Fraud Detection using Secure Multi-Party Selection
Characterising AI Weakness in Detecting Personal Data from Images By Crowds
Characterising AI Weakness in Detecting Personal Data from Images By Crowds
A distributed approach to improve inland water transportation addressing privacy and incremental improvements
A distributed approach to improve inland water transportation addressing privacy and incremental improvements
Measuring Polkadot
Measuring Polkadot: The Impact of Tor and a VPN on Polkadot's Performance and Security
Reverse Engineering of Web Cookies
Reverse Engineering of Web Cookies: When is too late for your private data?
Privacy Analysis of Decentralized Federated Learning
Privacy Analysis of Decentralized Federated Learning
Practical Privacy Preserving k-Nearest Neighbour in Outsourced Environments
Practical Privacy Preserving k-Nearest Neighbour in Outsourced Environments
From Points to Faces: An automotive lidar-based face recognition system
From Points to Faces: An automotive lidar-based face recognition system
Searched for: +
(1 - 20 of 25)

Pages