Searched for: +
(1 - 20 of 52)

Pages

Communication efficient privacy-preserving distributed optimization using adaptive differential quantization
Communication efficient privacy-preserving distributed optimization using adaptive differential quantization
Privacy-Friendly De-Authentication with BLUFADE
Privacy-Friendly De-Authentication with BLUFADE: Blurred Face Detection
Characterising AI Weakness in Detecting Personal Data from Images By Crowds
Characterising AI Weakness in Detecting Personal Data from Images By Crowds
Blockchain-based solutions for privacy in the Internet of Things Smart Environment
Blockchain-based solutions for privacy in the Internet of Things Smart Environment
A Survey on the Privacy-Preserving Applications of Secure Transformation in Collaborative Supply Chains
A Survey on the Privacy-Preserving Applications of Secure Transformation in Collaborative Supply Chains
Security and Privacy of Overlay-based ICN/IPCoexistence Approaches
Security and Privacy of Overlay-based ICN/IPCoexistence Approaches
Understanding Security and Privacy Characteristics ofHybrid-based IP-ICN Coexistence Architectures
Understanding Security and Privacy Characteristics ofHybrid-based IP-ICN Coexistence Architectures
Mitigating Inference Attacks in Collaborative Credit Card Fraud Detection using Secure Multi-Party Selection
Mitigating Inference Attacks in Collaborative Credit Card Fraud Detection using Secure Multi-Party Selection
Towards user-oriented privacy for recommender system data
Towards user-oriented privacy for recommender system data: A personalization-based approach to gender obfuscation for user profiles
Accurate Differentially Private Deep Learning on the Edge
Accurate Differentially Private Deep Learning on the Edge
The ethical application of biometric facial recognition technology
The ethical application of biometric facial recognition technology
Anonymous and Verifiable Reputation System for E-commerce Platforms based on Blockchain
Anonymous and Verifiable Reputation System for E-commerce Platforms based on Blockchain
Investigating the effect of security and privacy on IoT device purchase behaviour
Investigating the effect of security and privacy on IoT device purchase behaviour
Privacy-Preserving Data Aggregation with Probabilistic Range Validation
Privacy-Preserving Data Aggregation with Probabilistic Range Validation
Privacy-Preserving Data Aggregation with Probabilistic Range Validation
Privacy-Preserving Data Aggregation with Probabilistic Range Validation
Information availability and data breaches
Information availability and data breaches: Data breach notification laws and their effects
Core Values and Value Conflicts in Cybersecurity: Beyond Privacy Versus Security
Core Values and Value Conflicts in Cybersecurity: Beyond Privacy Versus Security
Someone really wanted that song but it was not me!
Someone really wanted that song but it was not me!: Evaluating Which Information to Disclose in Explanations for Group Recommendations
Sovereignty, privacy, and ethics in blockchain-based identity management systems
Sovereignty, privacy, and ethics in blockchain-based identity management systems
Perception of privacy in a university building
Perception of privacy in a university building: The transparency paradox
Searched for: +
(1 - 20 of 52)

Pages