Searched for: collection%253Air
(1 - 20 of 20)
How Much do Your Friends Tell About You?: Reconstructing Private Information from the Friendship Graph
How Much do Your Friends Tell About You?: Reconstructing Private Information from the Friendship Graph
A Social Cyber Contract Theory Model for Understanding National Cyber Strategies
A Social Cyber Contract Theory Model for Understanding National Cyber Strategies
Enforcing context-awareness and privacy-by-design in the specification of information systems
Enforcing context-awareness and privacy-by-design in the specification of information systems
How to improve policy making using open data in Virtual Research Environments? An interactive workshop discussing privacy, security and trust strategies
How to improve policy making using open data in Virtual Research Environments? An interactive workshop discussing privacy, security and trust strategies
Toward an ethics of digital government
Toward an ethics of digital government: A first discussion
When Willeke can get rid of paperwork
When Willeke can get rid of paperwork: A lean infrastructure for qualified information exchange based on trusted identities
A Causal Explanatory Model of Bayesian-belief Networks for Analysing the Risks of Opening Data
A Causal Explanatory Model of Bayesian-belief Networks for Analysing the Risks of Opening Data
BlUrM(or)e
BlUrM(or)e: Revisiting gender obfuscation in the user-item matrix
Someone really wanted that song but it was not me!
Someone really wanted that song but it was not me!: Evaluating Which Information to Disclose in Explanations for Group Recommendations
Privacy-Preserving Data Aggregation with Probabilistic Range Validation
Privacy-Preserving Data Aggregation with Probabilistic Range Validation
Privacy-Friendly De-Authentication with BLUFADE
Privacy-Friendly De-Authentication with BLUFADE: Blurred Face Detection
Secure and distributed assessment of privacy-preserving GWAS releases
Secure and distributed assessment of privacy-preserving GWAS releases
DEKS
DEKS: A Secure Cloud-Based Searchable Service Can Make Attackers Pay
Federated Learning for Tabular Data
Federated Learning for Tabular Data: Exploring Potential Risk to Privacy
Repetitive, Oblivious, and Unlinkable SkNN Over Encrypted-and-Updated Data on Cloud
Repetitive, Oblivious, and Unlinkable SkNN Over Encrypted-and-Updated Data on Cloud
Relevant Research Questions For Decentralised (Personal) Data Governance
Relevant Research Questions For Decentralised (Personal) Data Governance
Introduction to the Minitrack on Privacy, Trust, and Governance in the Data-driven Economy
Introduction to the Minitrack on Privacy, Trust, and Governance in the Data-driven Economy
Practical Verifiable & Privacy-Preserving Double Auctions
Practical Verifiable & Privacy-Preserving Double Auctions
Combining ID’s, Attributes, and Policies in Hyperledger Fabric
Combining ID’s, Attributes, and Policies in Hyperledger Fabric
Social Honeypot for Humans
Social Honeypot for Humans: Luring People Through Self-managed Instagram Pages
Searched for: collection%253Air
(1 - 20 of 20)