Quantifying and protecting location privacy [PDF]
Abstract This thesis addresses the timely concern of protecting privacy in the age of big data. We identify the two following problems as the fundamental problems in computational privacy: (i) consistently quantifying privacy in different systems and (ii) optimally protecting privacy using obfuscation mechanisms.
openaire +3 more sources
Reconstruction Attacks on Aggressive Relaxations of Differential Privacy [PDF]
Differential privacy is a widely accepted formal privacy definition that allows aggregate information about a dataset to be released while controlling privacy leakage for individuals whose records appear in the data. Due to the unavoidable tension between privacy and utility, there have been many works trying to relax the requirements of differential ...
arxiv
Blockchain-Enabled Authentication Handover With Efficient Privacy Protection in SDN-Based 5G Networks [PDF]
5G mobile networks provide additional benefits in terms of lower latency, higher data rates, and more coverage, in comparison to 4G networks, and they are also coming close to standardization.
Abbas Yazdinejad+3 more
semanticscholar +1 more source
An Examination of Privacy Policies of Global University Web Sites [PDF]
Due to demand in online services, universities throughout the world are increasing the content of their Web sites and adding features, such as online applications and e-learning.
Kuzma, Joanne
core +1 more source
A Framework for Analyzing and Comparing Privacy States [PDF]
This article develops a framework for analyzing and comparing privacy and privacy protections across (inter alia) time, place, and polity and for examining factors that affect privacy and privacy protection.
Biava, Ryan, Rubel, Alan
core +1 more source
Privacy Risk Perceptions and Privacy Protection Strategies [PDF]
Several opinion polls have reported that many people claim to be concerned about their privacy, yet that most people in fact do very little to protect their privacy. Are privacy concerns indeed insufficient motivators to adopt privacy protection strategies? What then characterizes the users of these strategies?
Isabelle Oomen, Ronald Leenes
openaire +3 more sources
An Example of Privacy and Data Protection Best Practices for Biometrics Data Processing in Border Control: Lesson Learned from SMILE [PDF]
Biometric recognition is a highly adopted technology to support different kinds of applications, ranging from security and access control applications to low enforcement applications. However, such systems raise serious privacy and data protection concerns. Misuse of data, compromising the privacy of individuals and/or authorized processing of data may
arxiv
Privacy Protection Based on Stream Cipher for Spatiotemporal Data in IoT
In the participatory sensing framework, privacy protection of the Internet of Things (IoT) is very important. In this article, cryptography-based methods are utilized to protect participants’ privacy information in unsecured network channels for dynamic ...
Tianen Liu+5 more
semanticscholar +1 more source
Evaluation method of privacy protection effect based on multi-layer fuzzy comprehensive evaluation
Aiming at the problem that the evaluation of the privacy protection effect from a single data level cannot describe the overall privacy protection effect of the network environment, with the help of the fuzzy comprehensive evaluation method, the privacy
YU Yihan, FU Yu, WU Xiaoping
doaj +3 more sources
Local Differential Privacy Location Protection for Mobile Terminals Based on Huffman Coding [PDF]
The location information of mobile terminals is closely linked to personal privacy, which may threaten users’ life and property safety if leaked. Local differential privacy model provides strict privacy protection effect, allows users to handle and ...
YAN Yan, LYU Yaqin, LI Feifei
doaj +1 more source