Searched for: +
(21 - 40 of 61)

Pages

Investigating the effect of security and privacy on IoT device purchase behaviour
Investigating the effect of security and privacy on IoT device purchase behaviour
Accurate Differentially Private Deep Learning on the Edge
Accurate Differentially Private Deep Learning on the Edge
Privacy-Preserving Data Aggregation with Probabilistic Range Validation
Privacy-Preserving Data Aggregation with Probabilistic Range Validation
Privacy-Preserving Data Aggregation with Probabilistic Range Validation
Privacy-Preserving Data Aggregation with Probabilistic Range Validation
Information availability and data breaches
Information availability and data breaches: Data breach notification laws and their effects
Sovereignty, privacy, and ethics in blockchain-based identity management systems
Sovereignty, privacy, and ethics in blockchain-based identity management systems
Privatized distributed anomaly detection for large-scale nonlinear uncertain systems
Privatized distributed anomaly detection for large-scale nonlinear uncertain systems
Perception of privacy in a university building
Perception of privacy in a university building: The transparency paradox
Core Values and Value Conflicts in Cybersecurity: Beyond Privacy Versus Security
Core Values and Value Conflicts in Cybersecurity: Beyond Privacy Versus Security
Someone really wanted that song but it was not me!
Someone really wanted that song but it was not me!: Evaluating Which Information to Disclose in Explanations for Group Recommendations
Do they really value your privacy?
Do they really value your privacy?: An exploratory analysis of what can be learned about companies from their privacy statements
Evaluating  Explanations for different Relationship Strengths
Evaluating Explanations for different Relationship Strengths
A Human-Machine Approach to Preserve Privacy in Image Analysis Crowdsourcing Tasks
A Human-Machine Approach to Preserve Privacy in Image Analysis Crowdsourcing Tasks
Road-user participation in vehicle-data sharing systems
Road-user participation in vehicle-data sharing systems: for the purpose of dynamic traffic management
Towards a New Prison
Towards a New Prison: Facilitating the cyber crime threat
BlUrM(or)e
BlUrM(or)e: Revisiting gender obfuscation in the user-item matrix
The Ethical Limits of Blockchain-Enabled Markets for Private IoT Data
The Ethical Limits of Blockchain-Enabled Markets for Private IoT Data
Personalized support for well-being at work
Personalized support for well-being at work: an overview of the SWELL project
Protecting the grid topology and user consumption patterns during state estimation in smart grids based on data obfuscation
Protecting the grid topology and user consumption patterns during state estimation in smart grids based on data obfuscation
Tracking Cookies in the European Union, an Empirical Analysis of the Current Situation
Tracking Cookies in the European Union, an Empirical Analysis of the Current Situation
Searched for: +
(21 - 40 of 61)

Pages