Results 11 to 20 of about 351,533 (201)
Towards Query Logs for Privacy Studies: On Deriving Search Queries from Questions [PDF]
Translating verbose information needs into crisp search queries is a phenomenon that is ubiquitous but hardly understood. Insights into this process could be valuable in several applications, including synthesizing large privacy-friendly query logs from ...
Biega, Asia J. +2 more
core +3 more sources
CYCLOSA: Decentralizing Private Web Search Through SGX-Based Browser Extensions [PDF]
By regularly querying Web search engines, users (unconsciously) disclose large amounts of their personal data as part of their search queries, among which some might reveal sensitive information (e.g.
Bouchenak, Sara +8 more
core +4 more sources
Review on Dark Web and Its Impact on Internet Governance
Cyber attackers use the Dark Web, a collection of facilities that are not visible to search engines and normal users, to explore a variety of illegal products and services. In this paper, the Dark Web and its impact on internet governance were analyzed.
Diviya Shini Rajamanickam +1 more
doaj +1 more source
Online services such as web search and e-commerce applications typically rely on the collection of data about users, including details of their activities on the web.
Horvitz, Eric +3 more
core +1 more source
Multi-Source Medical Data Integration and Mining for Healthcare Services
With the advent of Internet of Health (IoH) age, traditional medical or healthy services are gradually migrating to the Web or Internet and have been producing a considerable amount of medical data associated with patients, doctors, medicine, medical ...
Qingguo Zhang +5 more
doaj +1 more source
The Google Spain judgment established a search engine as a sui generis controller and the related ‘right to be forgotten’ (right to delisting) under data protection legislation, despite the controversies surrounding it primarily on account of the logic ...
Nina Gumzej
doaj +1 more source
Privacy Preservation by Disassociation [PDF]
In this work, we focus on protection against identity disclosure in the publication of sparse multidimensional data. Existing multidimensional anonymization techniquesa) protect the privacy of users either by altering the set of quasi-identifiers of the ...
Liagouris, John +3 more
core +2 more sources
Privacy Preserving User Based Web Service Recommendations
The Quality of Service (QoS)-based personalized web service recommendations have been gaining increasing popularity due to its ability to assist users in finding high quality web services.
Shahriar Badsha +5 more
doaj +1 more source
Personalized Web Search Architecture Supporting Privacy
Web is gigantic wellspring of information and data and each one relies upon it for accomplishing all kind of information. With the presence of enormous information and assortment of data it gets hard for end client to separate required data. Thus there comes the need to customize every client search so as to acquire important outcomes at the time of ...
Nidhi Saxena, Bineet Gupta
openaire +1 more source
Dark Web forensics, information security, and the investigation of illicit digital footprints [PDF]
The dark Web is like a secretive nook of the Internet, tucked away from the usual search engines and only reachable through specialized networks like Tor or I2P.
Izgarević Danilo +2 more
doaj +1 more source

