Results 1 to 10 of about 2,896,645 (370)

The Privacy ZEBRA: Zero Evidence Biometric Recognition Assessment [PDF]

open access: yes, 2020
Mounting privacy legislation calls for the preservation of privacy in speech technology, though solutions are gravely lacking. While evaluation campaigns are long-proven tools to drive progress, the need to consider a privacy adversary implies that ...
Bonastre, Jean-Francois   +7 more
core   +1 more source

Issues of privacy policy conflict in mobile social network

open access: yesInternational Journal of Distributed Sensor Networks, 2020
Privacy protection in mobile social networks is a hot issue in current research. Various privacy protection policies have been proposed. However, the conflict of privacy protection policies inevitably occurs.
Pingshui Wang, Qinjuan Ma
doaj   +1 more source

Examined Lives: Informational Privacy and the Subject as Object [PDF]

open access: yes, 2000
In the United States, proposals for informational privacy have proved enormously controversial. On a political level, such proposals threaten powerful data processing interests.
Cohen, Julie E.
core   +2 more sources

Survey of big-data-analysis-resistant privacy protection

open access: yes网络与信息安全学报, 2016
Privacy protection plays a significant role in big data era for data sharing and analysis.Traditional privacy protection approaches may not apply well for big data scenarios,because there may exist deep associations which can also cause privacy leakages ...
Wei TONG,AOYun-long M,Qing-jun CEHN,Bin-ru WANG,Bao-jia ZHANG,Sheng ZHONG
doaj   +3 more sources

Preliminary study on the construction of a data privacy protection course based on a teaching-in-practice range

open access: yes网络与信息安全学报, 2023
Since China’s Data Security Law, Personal Information Protection Law and related laws were formalized, demand for privacy protection technology talents has increased sharply, and data privacy protection courses have been gradually offered in the ...
Zhe SUN   +3 more
doaj   +3 more sources

A Novel Location Privacy-Preserving Approach Based on Blockchain

open access: yesSensors, 2020
Location-based services (LBS) bring convenience to people’s lives but are also accompanied with privacy leakages. To protect the privacy of LBS users, many location privacy protection algorithms were proposed.
Ying Qiu, Yi Liu, Xuan Li, Jiahui Chen
doaj   +1 more source

PLDP-FL: Federated Learning with Personalized Local Differential Privacy

open access: yesEntropy, 2023
As a popular machine learning method, federated learning (FL) can effectively solve the issues of data silos and data privacy. However, traditional federated learning schemes cannot provide sufficient privacy protection.
Xiaoying Shen   +4 more
doaj   +1 more source

Privacy computing:concept, connotation and its research trend

open access: yesTongxin xuebao, 2016
s: With the widespread application of mobile Internet, cloud computing and big data technologies, people enjoy the convenience of electronic business, information retrieval, social network and other services, whereas the threats of privacy leaks are ever
Feng-hua LI   +4 more
doaj   +2 more sources

Data protection: the future of privacy [PDF]

open access: yes, 2011
The Art. 29 Working Party (hereinafter “Art. 29 WP”) is an influential body comprised of representatives from the Member State Data Protection Authorities2 established under the Data Protection Directive 95/46/EC, has recently issued an opinion with the ...
Wong, R
core   +1 more source

Why the Economics Profession Must Actively Participate in the Privacy Protection Debate [PDF]

open access: yes, 2019
When Google or the U.S. Census Bureau publish detailed statistics on browsing habits or neighborhood characteristics, some privacy is lost for everybody while supplying public information. To date, economists have not focused on the privacy loss inherent
Abowd, John M   +3 more
core   +2 more sources

Home - About - Disclaimer - Privacy