Results 31 to 40 of about 500,755 (330)

Design Challenges for GDPR RegTech [PDF]

open access: yes, 2020
The Accountability Principle of the GDPR requires that an organisation can demonstrate compliance with the regulations. A survey of GDPR compliance software solutions shows significant gaps in their ability to demonstrate compliance. In contrast, RegTech
Brennan, Rob, Crane, Martin, Ryan, Paul
core   +2 more sources

Practical Schemes For Privacy & Security Enhanced RFID

open access: yes, 2009
Proper privacy protection in RFID systems is important. However, many of the schemes known are impractical, either because they use hash functions instead of the more hardware efficient symmetric encryption schemes as a efficient cryptographic primitive,
Hoepman, J.H., Joosten, R., Samarati, P.
core   +5 more sources

P2KMV: A Privacy-preserving Counting Sketch for Efficient and Accurate Set Intersection Cardinality Estimations [PDF]

open access: yes, 2018
In this paper, we propose P2KMV, a novel privacy-preserving counting sketch, based on the k minimum values algorithm. With P2KMV, we offer a versatile privacy-enhanced technology for obtaining statistics, following the principle of data minimization, and
Scheuermann, Björn   +2 more
core   +2 more sources

Towards understanding source location privacy in wireless sensor networks through fake sources [PDF]

open access: yes, 2012
Source location privacy is becoming an increasingly important property in wireless sensor network applications, such as asset monitoring. The original source location problem is to protect the location of a source in a wireless sensor network from a ...
Bradbury, Matthew S.   +2 more
core   +1 more source

Survey of big-data-analysis-resistant privacy protection

open access: yes网络与信息安全学报, 2016
Privacy protection plays a significant role in big data era for data sharing and analysis.Traditional privacy protection approaches may not apply well for big data scenarios,because there may exist deep associations which can also cause privacy leakages ...
Wei TONG,AOYun-long M,Qing-jun CEHN,Bin-ru WANG,Bao-jia ZHANG,Sheng ZHONG
doaj   +3 more sources

Privacy Preserving Data Mining by Using Implicit Function Theorem

open access: yes, 2013
Data mining has made broad significant multidisciplinary field used in vast application domains and extracts knowledge by identifying structural relationship among the objects in large data bases.
Narsimha, Gugulothu, Rajesh, Pasupuleti
core   +1 more source

Privacy-Enhanced Searches Using Encrypted Bloom Filters [PDF]

open access: yes, 2007
It is often necessary for two or more or more parties that do not fully trust each other to share data selectively. For example, one intelligence agency might be willing to turn over certain documents to another such agency, but only if the second agency
Bellovin, Steven Michael   +1 more
core   +2 more sources

Financial Burden Associated With Hospitalisation Among Families of Childhood Brain Tumours in Australia

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background Families of children with cancer experience significant financial strain, even with universal healthcare. Indirect costs, such as productivity losses and non‐medical expenses, are rarely included in economic evaluations, and little is known about how effectively financial aid programmes alleviate this burden. Childhood brain tumours
Megumi Lim   +8 more
wiley   +1 more source

Libraries, Electronic Resources, and Privacy: The Case for Positive Intellectual Freedom [PDF]

open access: yes, 2014
Public and research libraries have long provided resources in electronic formats, and the tension between providing electronic resources and patron privacy is widely recognized.
Rubel, Alan
core  

PrivateRide: A Privacy-Enhanced Ride-Hailing Service [PDF]

open access: yes, 2017
In the past few years, we have witnessed a rise in the popularity of ride-hailing services (RHSs), an on-line marketplace that enables accredited drivers to use their own cars to drive ride-hailing users.
Dacosta, I.   +7 more
core   +4 more sources

Home - About - Disclaimer - Privacy