Searched for: +
(1 - 20 of 60)

Pages

Measuring Polkadot
Measuring Polkadot: The Impact of Tor and a VPN on Polkadot's Performance and Security
A distributed approach to improve inland water transportation addressing privacy and incremental improvements
A distributed approach to improve inland water transportation addressing privacy and incremental improvements
Communication efficient privacy-preserving distributed optimization using adaptive differential quantization
Communication efficient privacy-preserving distributed optimization using adaptive differential quantization
Secure and distributed assessment of privacy-preserving GWAS releases
Secure and distributed assessment of privacy-preserving GWAS releases
PrivGait
PrivGait: An Energy Harvesting-based Privacy-Preserving User Identification System by Gait Analysis
The business value of privacy-preserving technologies
The business value of privacy-preserving technologies: the case of multiparty computation in the telecom industry
DEKS
DEKS: A Secure Cloud-Based Searchable Service Can Make Attackers Pay
Repetitive, Oblivious, and Unlinkable SkNN Over Encrypted-and-Updated Data on Cloud
Repetitive, Oblivious, and Unlinkable SkNN Over Encrypted-and-Updated Data on Cloud
Federated Learning for Tabular Data
Federated Learning for Tabular Data: Exploring Potential Risk to Privacy
Privacy-Friendly De-Authentication with BLUFADE
Privacy-Friendly De-Authentication with BLUFADE: Blurred Face Detection
Characterising AI Weakness in Detecting Personal Data from Images By Crowds
Characterising AI Weakness in Detecting Personal Data from Images By Crowds
Blockchain-based solutions for privacy in the Internet of Things Smart Environment
Blockchain-based solutions for privacy in the Internet of Things Smart Environment
A Survey on the Privacy-Preserving Applications of Secure Transformation in Collaborative Supply Chains
A Survey on the Privacy-Preserving Applications of Secure Transformation in Collaborative Supply Chains
Security and Privacy of Overlay-based ICN/IPCoexistence Approaches
Security and Privacy of Overlay-based ICN/IPCoexistence Approaches
Understanding Security and Privacy Characteristics ofHybrid-based IP-ICN Coexistence Architectures
Understanding Security and Privacy Characteristics ofHybrid-based IP-ICN Coexistence Architectures
Mitigating Inference Attacks in Collaborative Credit Card Fraud Detection using Secure Multi-Party Selection
Mitigating Inference Attacks in Collaborative Credit Card Fraud Detection using Secure Multi-Party Selection
Towards user-oriented privacy for recommender system data
Towards user-oriented privacy for recommender system data: A personalization-based approach to gender obfuscation for user profiles
The ethical application of biometric facial recognition technology
The ethical application of biometric facial recognition technology
Anonymous and Verifiable Reputation System for E-commerce Platforms based on Blockchain
Anonymous and Verifiable Reputation System for E-commerce Platforms based on Blockchain
Investigating the effect of security and privacy on IoT device purchase behaviour
Investigating the effect of security and privacy on IoT device purchase behaviour
Searched for: +
(1 - 20 of 60)

Pages