Searched for: +
(1 - 20 of 52)

Pages

RFID Guardian Prototype
RFID Guardian Prototype
Sense Umbrella Connection and Desensitisation
Sense Umbrella Connection and Desensitisation: Weather Witness
A boolean QPQ using single photons
A boolean QPQ using single photons
Blockchain-based solutions for privacy in the Internet of Things Smart Environment
Blockchain-based solutions for privacy in the Internet of Things Smart Environment
A Survey on the Privacy-Preserving Applications of Secure Transformation in Collaborative Supply Chains
A Survey on the Privacy-Preserving Applications of Secure Transformation in Collaborative Supply Chains
Security and Privacy of Overlay-based ICN/IPCoexistence Approaches
Security and Privacy of Overlay-based ICN/IPCoexistence Approaches
Understanding Security and Privacy Characteristics ofHybrid-based IP-ICN Coexistence Architectures
Understanding Security and Privacy Characteristics ofHybrid-based IP-ICN Coexistence Architectures
Core Values and Value Conflicts in Cybersecurity: Beyond Privacy Versus Security
Core Values and Value Conflicts in Cybersecurity: Beyond Privacy Versus Security
How to improve policy making using open data in Virtual Research Environments? An interactive workshop discussing privacy, security and trust strategies
How to improve policy making using open data in Virtual Research Environments? An interactive workshop discussing privacy, security and trust strategies
How Much do Your Friends Tell About You?: Reconstructing Private Information from the Friendship Graph
How Much do Your Friends Tell About You?: Reconstructing Private Information from the Friendship Graph
When Willeke can get rid of paperwork
When Willeke can get rid of paperwork: A lean infrastructure for qualified information exchange based on trusted identities
BlUrM(or)e
BlUrM(or)e: Revisiting gender obfuscation in the user-item matrix
A Social Cyber Contract Theory Model for Understanding National Cyber Strategies
A Social Cyber Contract Theory Model for Understanding National Cyber Strategies
A Causal Explanatory Model of Bayesian-belief Networks for Analysing the Risks of Opening Data
A Causal Explanatory Model of Bayesian-belief Networks for Analysing the Risks of Opening Data
Someone really wanted that song but it was not me!
Someone really wanted that song but it was not me!: Evaluating Which Information to Disclose in Explanations for Group Recommendations
Enforcing context-awareness and privacy-by-design in the specification of information systems
Enforcing context-awareness and privacy-by-design in the specification of information systems
Toward an ethics of digital government
Toward an ethics of digital government: A first discussion
Privacy-Preserving Data Aggregation with Probabilistic Range Validation
Privacy-Preserving Data Aggregation with Probabilistic Range Validation
Privacy-Friendly De-Authentication with BLUFADE
Privacy-Friendly De-Authentication with BLUFADE: Blurred Face Detection
Private Computing with Untrustworthy Proxies
Private Computing with Untrustworthy Proxies
Searched for: +
(1 - 20 of 52)

Pages