Academic literature on the topic 'Deletion Privacy'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Deletion Privacy.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Deletion Privacy"
Keele. "Privacy by Deletion: The Need for a Global Data Deletion Principle." Indiana Journal of Global Legal Studies 16, no. 1 (2009): 363. http://dx.doi.org/10.2979/gls.2009.16.1.363.
Full textMinaei, Mohsen, Mainack Mondal, Patrick Loiseau, Krishna Gummadi, and Aniket Kate. "Lethe: Conceal Content Deletion from Persistent Observers." Proceedings on Privacy Enhancing Technologies 2019, no. 1 (2019): 206–26. http://dx.doi.org/10.2478/popets-2019-0012.
Full textLiu, Chen, Hoda Aghaei Khouzani, and Chengmo Yang. "ErasuCrypto: A Light-weight Secure Data Deletion Scheme for Solid State Drives." Proceedings on Privacy Enhancing Technologies 2017, no. 1 (2017): 132–48. http://dx.doi.org/10.1515/popets-2017-0009.
Full textLiu, Lu, Zhi Han Liu, and Fang Chun Yang. "Mechanism of User Profile Complete Deletion Concerning Temporary Scenario Oriented Application of Mobile SNS." Advanced Materials Research 171-172 (December 2010): 346–49. http://dx.doi.org/10.4028/www.scientific.net/amr.171-172.346.
Full textLin, Chun-Wei, Binbin Zhang, Kuo-Tung Yang, and Tzung-Pei Hong. "Efficiently Hiding Sensitive Itemsets with Transaction Deletion Based on Genetic Algorithms." Scientific World Journal 2014 (2014): 1–13. http://dx.doi.org/10.1155/2014/398269.
Full textXue, Di, Li-Fa Wu, Hua-Bo Li, Zheng Hong, and Zhen-Ji Zhou. "A novel destination prediction attack and corresponding location privacy protection method in geo-social networks." International Journal of Distributed Sensor Networks 13, no. 1 (2017): 155014771668542. http://dx.doi.org/10.1177/1550147716685421.
Full textShan, Fangfang, Hui Li, Fenghua Li, Yunchuan Guo, and Jinbo Xiong. "An Attribute-Based Assured Deletion Scheme in Cloud Computing." International Journal of Information Technology and Web Engineering 14, no. 2 (2019): 74–91. http://dx.doi.org/10.4018/ijitwe.2019040105.
Full textMa, Jun, Minshen Wang, Jinbo Xiong, and Yongjin Hu. "CP-ABE-Based Secure and Verifiable Data Deletion in Cloud." Security and Communication Networks 2021 (March 27, 2021): 1–14. http://dx.doi.org/10.1155/2021/8855341.
Full textChild, Jeffrey T., Paul M. Haridakis, and Sandra Petronio. "Blogging privacy rule orientations, privacy management, and content deletion practices: The variability of online privacy management activity at different stages of social media use." Computers in Human Behavior 28, no. 5 (2012): 1859–72. http://dx.doi.org/10.1016/j.chb.2012.05.004.
Full textGoni, Kyriaki. "Deletion Process_Only you can see my history: Investigating Digital Privacy, Digital Oblivion, and Control on Personal Data Through an Interactive Art Installation." Leonardo 49, no. 4 (2016): 324–33. http://dx.doi.org/10.1162/leon_a_01285.
Full textDissertations / Theses on the topic "Deletion Privacy"
(9525917), Mohsen Minaei. "Privacy Preserving Systems With Crowd Blending." Thesis, 2020.
Find full textChao, Jianfu, and 趙健甫. "From The Deletion Of "Private Bank" To Talk About The Meaning Of The Amendment Of Banking Law In 1975." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/87345444157970887860.
Full textBook chapters on the topic "Deletion Privacy"
Xu, Peng, Shuai Liang, Wei Wang, Willy Susilo, Qianhong Wu, and Hai Jin. "Dynamic Searchable Symmetric Encryption with Physical Deletion and Small Leakage." In Information Security and Privacy. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-60055-0_11.
Full textRadin, Margaret Jane. "Democratic Degradation." In Boilerplate. Princeton University Press, 2012. http://dx.doi.org/10.23943/princeton/9780691155333.003.0003.
Full text"Deleting Personal Information Held by the Police." In Criminal Records, Privacy and the Criminal Justice System: A Practical Handbook. Bloomsbury Professional, 2019. http://dx.doi.org/10.5040/9781526507020.chapter-004.
Full textMogollon, Manuel. "Confidentiality." In Cryptography and Security Services. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-837-6.ch004.
Full textSchwartz, Charles E., Fiorella Gurrieri, and Giovanni Neri. "Intellectual Disability Syndromes." In Neurobiology of Mental Illness, edited by Joseph D. Buxbaum. Oxford University Press, 2013. http://dx.doi.org/10.1093/med/9780199934959.003.0076.
Full textPournelle, Jerry. "Dealing with Spam." In 1001 Computer Words You Need to Know. Oxford University Press, 2004. http://dx.doi.org/10.1093/oso/9780195167757.003.0012.
Full textConference papers on the topic "Deletion Privacy"
Reardon, J., D. Basin, and S. Capkun. "SoK: Secure Data Deletion." In 2013 IEEE Symposium on Security and Privacy (SP) Conference. IEEE, 2013. http://dx.doi.org/10.1109/sp.2013.28.
Full textShah, Dipalee, and Rajesh Ingle. "Privacy-preserving deletion to generalization-based anonymous database." In the CUBE International Information Technology Conference. ACM Press, 2012. http://dx.doi.org/10.1145/2381716.2381803.
Full textRoche, Daniel S., Adam Aviv, and Seung Geol Choi. "A Practical Oblivious Map Data Structure with Secure Deletion and History Independence." In 2016 IEEE Symposium on Security and Privacy (SP). IEEE, 2016. http://dx.doi.org/10.1109/sp.2016.19.
Full textBlock, Alexander R., and Jeremiah Blocki. "Private and Resource-Bounded Locally Decodable Codes for Insertions and Deletions." In 2021 IEEE International Symposium on Information Theory (ISIT). IEEE, 2021. http://dx.doi.org/10.1109/isit45174.2021.9518249.
Full text