Results 291 to 300 of about 225,999 (330)
Some of the next articles are maybe not open access.
Intelligence and Security Informatics, 2020
Personally identifiable information (PII) has become a major target of cyber-attacks, causing severe losses to data breach victims. To protect data breach victims, researchers focus on collecting exposed PII to assess privacy risk and identify at-risk ...
Yizhi Liu +8 more
semanticscholar +1 more source
Personally identifiable information (PII) has become a major target of cyber-attacks, causing severe losses to data breach victims. To protect data breach victims, researchers focus on collecting exposed PII to assess privacy risk and identify at-risk ...
Yizhi Liu +8 more
semanticscholar +1 more source
Conference on Data and Application Security and Privacy
Online services leverage various authentication methods with differing usability and reliability trade-offs, such as password-based or multi-factor authentication (MFA).
Mehrnoosh Zaeifi +8 more
semanticscholar +1 more source
Online services leverage various authentication methods with differing usability and reliability trade-offs, such as password-based or multi-factor authentication (MFA).
Mehrnoosh Zaeifi +8 more
semanticscholar +1 more source
International Conference on Trust, Privacy and Security in Intelligent Systems and Applications, 2020
People continue to store their sensitive information in their smart-phone applications. Users seldom read an app’s privacy policy to see how their information is being collected, used, and shared.
Kai-Chi Chang +3 more
semanticscholar +1 more source
People continue to store their sensitive information in their smart-phone applications. Users seldom read an app’s privacy policy to see how their information is being collected, used, and shared.
Kai-Chi Chang +3 more
semanticscholar +1 more source
2024 International Conference on Advances in Computing, Communication and Applied Informatics (ACCAI)
The aim of this work is to revolutionize digital identity management by introducing a secure, decentralized and user-centric approach using block chain. It includes a number of trained websites which are both risky and nonrisky.
P. Kalyanasundaram +4 more
semanticscholar +1 more source
The aim of this work is to revolutionize digital identity management by introducing a secure, decentralized and user-centric approach using block chain. It includes a number of trained websites which are both risky and nonrisky.
P. Kalyanasundaram +4 more
semanticscholar +1 more source
2020 International Conference on Data Mining Workshops (ICDMW), 2020
The information privacy of the Internet users has become a major societal concern. The rapid growth of online services increases the risk of unauthorized access to Personally Identifiable Information (PII) of at-risk populations, who are unaware of their
Fangyu Lin +8 more
semanticscholar +1 more source
The information privacy of the Internet users has become a major societal concern. The rapid growth of online services increases the risk of unauthorized access to Personally Identifiable Information (PII) of at-risk populations, who are unaware of their
Fangyu Lin +8 more
semanticscholar +1 more source
A Note on the Power of Personal Identifying Information
Journal of the Operational Research Society, 1982The values of names, addresses and dates of birth for identifying individuals uniquely depends on several factors. This note shows how to combine the inherent power of an identifier, its availability and its error rate to give a practical measure for ranking its usefulness.
openaire +1 more source
Scanning electronic documents for personally identifiable information
Proceedings of the 5th ACM workshop on Privacy in electronic society, 2006Sometimes, it is necessary to remove author names and other personally identifiable information (PII) from documents before publication. We have implemented a novel defensive tool for detecting such data automatically. By using the detection tool, we have learned about where PII may be stored in documents and how it is put there.
Tuomas Aura, Thomas A. Kuhn, Michael Roe
openaire +1 more source
The Case for De-Identifying Personal Health Information
SSRN Electronic Journal, 2011The demand on data custodians to disclose health information for secondary purposes is increasing dramatically. These demands come from researchers, public health professionals, commercial actors, and governments. In many jurisdictions, de-identification is one set of methods that can be used to allow the use and disclosure of health information ...
Khaled El Emam +2 more
openaire +1 more source
2018 International Conference on Computing, Electronics & Communications Engineering (iCCECE), 2018
Surveillance and secrecy breaching incidents of users' privacy questioned the current third-parties data collection procedure. Massive amounts of Personally Identifiable Information (PII) are being exploited due to malpractice, identity theft, spamming ...
Nasr Al-Zaben +4 more
semanticscholar +1 more source
Surveillance and secrecy breaching incidents of users' privacy questioned the current third-parties data collection procedure. Massive amounts of Personally Identifiable Information (PII) are being exploited due to malpractice, identity theft, spamming ...
Nasr Al-Zaben +4 more
semanticscholar +1 more source
The Collection, Dissemination and Tagging of Personally Identifying Information
SSRN Electronic Journal, 2008As the twenty-first century bustles forward, the e-commerce becomes an ever more dangerous place. On a daily basis, websites collect vast amounts of personally identifying information (PII) and mine it in sophisticated databases to discover consumer trends and desires.
openaire +1 more source

