Results 31 to 40 of about 500,755 (330)
Design Challenges for GDPR RegTech [PDF]
The Accountability Principle of the GDPR requires that an organisation can demonstrate compliance with the regulations. A survey of GDPR compliance software solutions shows significant gaps in their ability to demonstrate compliance. In contrast, RegTech
Brennan, Rob, Crane, Martin, Ryan, Paul
core +2 more sources
Practical Schemes For Privacy & Security Enhanced RFID
Proper privacy protection in RFID systems is important. However, many of the schemes known are impractical, either because they use hash functions instead of the more hardware efficient symmetric encryption schemes as a efficient cryptographic primitive,
Hoepman, J.H., Joosten, R., Samarati, P.
core +5 more sources
P2KMV: A Privacy-preserving Counting Sketch for Efficient and Accurate Set Intersection Cardinality Estimations [PDF]
In this paper, we propose P2KMV, a novel privacy-preserving counting sketch, based on the k minimum values algorithm. With P2KMV, we offer a versatile privacy-enhanced technology for obtaining statistics, following the principle of data minimization, and
Scheuermann, Björn +2 more
core +2 more sources
Towards understanding source location privacy in wireless sensor networks through fake sources [PDF]
Source location privacy is becoming an increasingly important property in wireless sensor network applications, such as asset monitoring. The original source location problem is to protect the location of a source in a wireless sensor network from a ...
Bradbury, Matthew S. +2 more
core +1 more source
Survey of big-data-analysis-resistant privacy protection
Privacy protection plays a significant role in big data era for data sharing and analysis.Traditional privacy protection approaches may not apply well for big data scenarios,because there may exist deep associations which can also cause privacy leakages ...
Wei TONG,AOYun-long M,Qing-jun CEHN,Bin-ru WANG,Bao-jia ZHANG,Sheng ZHONG
doaj +3 more sources
Privacy Preserving Data Mining by Using Implicit Function Theorem
Data mining has made broad significant multidisciplinary field used in vast application domains and extracts knowledge by identifying structural relationship among the objects in large data bases.
Narsimha, Gugulothu, Rajesh, Pasupuleti
core +1 more source
Privacy-Enhanced Searches Using Encrypted Bloom Filters [PDF]
It is often necessary for two or more or more parties that do not fully trust each other to share data selectively. For example, one intelligence agency might be willing to turn over certain documents to another such agency, but only if the second agency
Bellovin, Steven Michael +1 more
core +2 more sources
ABSTRACT Background Families of children with cancer experience significant financial strain, even with universal healthcare. Indirect costs, such as productivity losses and non‐medical expenses, are rarely included in economic evaluations, and little is known about how effectively financial aid programmes alleviate this burden. Childhood brain tumours
Megumi Lim +8 more
wiley +1 more source
Libraries, Electronic Resources, and Privacy: The Case for Positive Intellectual Freedom [PDF]
Public and research libraries have long provided resources in electronic formats, and the tension between providing electronic resources and patron privacy is widely recognized.
Rubel, Alan
core
PrivateRide: A Privacy-Enhanced Ride-Hailing Service [PDF]
In the past few years, we have witnessed a rise in the popularity of ride-hailing services (RHSs), an on-line marketplace that enables accredited drivers to use their own cars to drive ride-hailing users.
Dacosta, I. +7 more
core +4 more sources

