Results 101 to 110 of about 2,873,813 (294)

Blowfish Privacy: Tuning Privacy-Utility Trade-offs using Policies

open access: yes, 2014
Privacy definitions provide ways for trading-off the privacy of individuals in a statistical database for the utility of downstream analysis of the data.
Ding, Bolin   +2 more
core   +1 more source

The Value of Online Information Privacy: An Empirical Investigation [PDF]

open access: yes
Concern over online information privacy is widespread and rising. However, prior research is silent about the value of information privacy in the presence of potential benefits from sharing personally identifiable information.
I.P.L. Png   +3 more
core   +3 more sources

Adaptive Transformation for Robust Privacy Protection in Video Surveillance

open access: yesAdvances in Multimedia, 2012
Privacy is a big concern in current video surveillance systems. Due to privacy issues, many strategic places remain unmonitored leading to security threats.
Mukesh Saini   +3 more
doaj   +1 more source

PRIVED: a Privacy Model for Heterogeneous Mobile Networks [PDF]

open access: yes, 2011
We propose a network-oriented privacy model (PRIVED) composed by a well defined information model, using events, information sets and relationships to define the conceptual privacy relationships that can occur in the network.
Aguiar, Rui   +2 more
core   +1 more source

Combination Of Fingerprint For Privacy Protection

open access: yes, 2017
Biometric refers to the authentication technique which depends on the measurement and statistical analysis of people’s physical and behavioral characteristics. Among all the biometric technique fingerprint identification is consider as most reliable technique as every individual has unique fingerprint.
Miss Rathod Leena Anil, D B Mantri
openaire   +3 more sources

Motivational Factors in Privacy Protection Behaviour Model for Social Networking

open access: yesMATEC Web of Conferences, 2018
This study aims to investigate the determinants of the privacy protection behaviour strategies that been employed by users while utilising SNSs. By understanding the determinants of privacy protection will be able to generate awareness that can protect ...
Sedek Muliati   +2 more
doaj   +1 more source

Self-adaptive Privacy Concern Detection for User-generated Content [PDF]

open access: yesProceedings of the 19th International Conference on Computational Linguistics and Intelligent Text Processing, 2018, 2018
To protect user privacy in data analysis, a state-of-the-art strategy is differential privacy in which scientific noise is injected into the real analysis output. The noise masks individual's sensitive information contained in the dataset. However, determining the amount of noise is a key challenge, since too much noise will destroy data utility while ...
arxiv  

Homomorphic Encryption for Speaker Recognition: Protection of Biometric Templates and Vendor Model Parameters

open access: yes, 2018
Data privacy is crucial when dealing with biometric data. Accounting for the latest European data privacy regulation and payment service directive, biometric template protection is essential for any commercial application.
Busch, Christoph   +4 more
core   +1 more source

From Theory to Comprehension: A Comparative Study of Differential Privacy and $k$-Anonymity [PDF]

open access: yesarXiv
The notion of $\varepsilon$-differential privacy is a widely used concept of providing quantifiable privacy to individuals. However, it is unclear how to explain the level of privacy protection provided by a differential privacy mechanism with a set $\varepsilon$.
arxiv  

Image Privacy Protection: A Survey [PDF]

open access: yesarXiv
Images serve as a crucial medium for communication, presenting information in a visually engaging format that facilitates rapid comprehension of key points. Meanwhile, during transmission and storage, they contain significant sensitive information.
arxiv  

Home - About - Disclaimer - Privacy