Results 71 to 80 of about 2,873,813 (294)

Quantifying and protecting location privacy [PDF]

open access: yesit - Information Technology, 2015
Abstract This thesis addresses the timely concern of protecting privacy in the age of big data. We identify the two following problems as the fundamental problems in computational privacy: (i) consistently quantifying privacy in different systems and (ii) optimally protecting privacy using obfuscation mechanisms.
openaire   +3 more sources

Reconstruction Attacks on Aggressive Relaxations of Differential Privacy [PDF]

open access: yesarXiv, 2022
Differential privacy is a widely accepted formal privacy definition that allows aggregate information about a dataset to be released while controlling privacy leakage for individuals whose records appear in the data. Due to the unavoidable tension between privacy and utility, there have been many works trying to relax the requirements of differential ...
arxiv  

Blockchain-Enabled Authentication Handover With Efficient Privacy Protection in SDN-Based 5G Networks [PDF]

open access: yesIEEE Transactions on Network Science and Engineering, 2019
5G mobile networks provide additional benefits in terms of lower latency, higher data rates, and more coverage, in comparison to 4G networks, and they are also coming close to standardization.
Abbas Yazdinejad   +3 more
semanticscholar   +1 more source

An Examination of Privacy Policies of Global University Web Sites [PDF]

open access: yes, 2011
Due to demand in online services, universities throughout the world are increasing the content of their Web sites and adding features, such as online applications and e-learning.
Kuzma, Joanne
core   +1 more source

A Framework for Analyzing and Comparing Privacy States [PDF]

open access: yes, 2014
This article develops a framework for analyzing and comparing privacy and privacy protections across (inter alia) time, place, and polity and for examining factors that affect privacy and privacy protection.
Biava, Ryan, Rubel, Alan
core   +1 more source

Privacy Risk Perceptions and Privacy Protection Strategies [PDF]

open access: yes, 2008
Several opinion polls have reported that many people claim to be concerned about their privacy, yet that most people in fact do very little to protect their privacy. Are privacy concerns indeed insufficient motivators to adopt privacy protection strategies? What then characterizes the users of these strategies?
Isabelle Oomen, Ronald Leenes
openaire   +3 more sources

An Example of Privacy and Data Protection Best Practices for Biometrics Data Processing in Border Control: Lesson Learned from SMILE [PDF]

open access: yesarXiv, 2022
Biometric recognition is a highly adopted technology to support different kinds of applications, ranging from security and access control applications to low enforcement applications. However, such systems raise serious privacy and data protection concerns. Misuse of data, compromising the privacy of individuals and/or authorized processing of data may
arxiv  

Privacy Protection Based on Stream Cipher for Spatiotemporal Data in IoT

open access: yesIEEE Internet of Things Journal, 2020
In the participatory sensing framework, privacy protection of the Internet of Things (IoT) is very important. In this article, cryptography-based methods are utilized to protect participants’ privacy information in unsecured network channels for dynamic ...
Tianen Liu   +5 more
semanticscholar   +1 more source

Evaluation method of privacy protection effect based on multi-layer fuzzy comprehensive evaluation

open access: yes网络与信息安全学报, 2020
Aiming at the problem that the evaluation of the privacy protection effect from a single data level cannot describe the overall privacy protection effect of the network environment, with the help of the fuzzy comprehensive evaluation method, the privacy
YU Yihan, FU Yu, WU Xiaoping
doaj   +3 more sources

Local Differential Privacy Location Protection for Mobile Terminals Based on Huffman Coding [PDF]

open access: yesJisuanji kexue yu tansuo
The location information of mobile terminals is closely linked to personal privacy, which may threaten users’ life and property safety if leaked. Local differential privacy model provides strict privacy protection effect, allows users to handle and ...
YAN Yan, LYU Yaqin, LI Feifei
doaj   +1 more source

Home - About - Disclaimer - Privacy