Academic literature on the topic 'Privacy-Enhancing Technology'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Privacy-Enhancing Technology.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Privacy-Enhancing Technology"
Wolfe, Henry B. "Privacy enhancing technology." Computer Fraud & Security 1997, no. 10 (October 1997): 11–15. http://dx.doi.org/10.1016/s1361-3723(97)89951-4.
Full textPelkola, David. "A Framework for Managing Privacy-Enhancing Technology." IEEE Software 29, no. 3 (May 2012): 45–49. http://dx.doi.org/10.1109/ms.2012.47.
Full textJaved, Ibrahim Tariq, Fares Alharbi, Tiziana Margaria, Noel Crespi, and Kashif Naseer Qureshi. "PETchain: A Blockchain-Based Privacy Enhancing Technology." IEEE Access 9 (2021): 41129–43. http://dx.doi.org/10.1109/access.2021.3064896.
Full textHuang, Hsiao-Ying, and Masooda Bashir. "The onion router: Understanding a privacy enhancing technology community." Proceedings of the Association for Information Science and Technology 53, no. 1 (2016): 1–10. http://dx.doi.org/10.1002/pra2.2016.14505301034.
Full textKosta, Eleni, Jan Zibuschka, Tobias Scherner, and Jos Dumortier. "Legal considerations on privacy-enhancing Location Based Services using PRIME technology." Computer Law & Security Review 24, no. 2 (January 2008): 139–46. http://dx.doi.org/10.1016/j.clsr.2008.01.006.
Full textNamara, Moses, Daricia Wilkinson, Kelly Caine, and Bart P. Knijnenburg. "Emotional and Practical Considerations Towards the Adoption and Abandonment of VPNs as a Privacy-Enhancing Technology." Proceedings on Privacy Enhancing Technologies 2020, no. 1 (January 1, 2020): 83–102. http://dx.doi.org/10.2478/popets-2020-0006.
Full textPeltsverger, Svetlana, and Guangzhi Zheng. "Enhancing Privacy Education with a Technical Emphasis in IT Curriculum." Journal of Information Technology Education: Innovations in Practice 15 (2016): 001–17. http://dx.doi.org/10.28945/2330.
Full textFurnell, Steven, Rossouw von Solms, and Andy Phippen. "Preventative Actions for Enhancing Online Protection and Privacy." International Journal of Information Technologies and Systems Approach 4, no. 2 (July 2011): 1–11. http://dx.doi.org/10.4018/jitsa.2011070101.
Full textLahlou, Saadi. "Identity, social status, privacy and face-keeping in digital society." Social Science Information 47, no. 3 (September 2008): 299–330. http://dx.doi.org/10.1177/0539018408092575.
Full textPerez, Alfredo, Sherali Zeadally, Luis Matos Garcia, Jaouad Mouloud, and Scott Griffith. "FacePET: Enhancing Bystanders’ Facial Privacy with Smart Wearables/Internet of Things." Electronics 7, no. 12 (December 3, 2018): 379. http://dx.doi.org/10.3390/electronics7120379.
Full textDissertations / Theses on the topic "Privacy-Enhancing Technology"
Ripmann, Nina. "User Interface Design for Privacy Enhancing Technology." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for telematikk, 2012. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-18731.
Full textVan, Staden W. J. S. (Wynand Johannes Christiaan). "A model for compound purposes and reasons as a privacy enhancing technology in a relational database." Thesis, University of Pretoria, 2011. http://hdl.handle.net/2263/26818.
Full textThesis (PhD)--University of Pretoria, 2011.
Computer Science
unrestricted
Agrafiotis, Ioannis. "Enhancing user's privacy : developing a model for managing and testing the lifecycle of consent and revocation." Thesis, University of Warwick, 2012. http://wrap.warwick.ac.uk/57981/.
Full textTillwick, Heiko Mark. "Polar proxies collaborating to achieve anonymous web browsing /." Diss., Pretoria : [s.n.], 2007. http://upetd.up.ac.za/thesis/available/etd-07052007-115229.
Full textLindegren, Daniel. "Designing for user awareness and usability : An evaluation of authorization dialogs on a mobile device." Thesis, Karlstads universitet, Handelshögskolan, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-62731.
Full textCREDENTIAL
Maus, Benjamin. "Designing Usable Transparency for Mobile Health Research: The impact of transparency enhancing tools on the users’ trust in citizen science apps." Thesis, Malmö universitet, Fakulteten för kultur och samhälle (KS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-21637.
Full textPurra, Joel. "Swedes Online: You Are More Tracked Than You Think." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-117075.
Full textSource code, datasets, and a video recording of the presentation is available on the master's thesis website.
Murmann, Patrick. "Towards Usable Transparency via Individualisation." Licentiate thesis, Karlstads universitet, Institutionen för matematik och datavetenskap (from 2013), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-71120.
Full textPaper 2 ingick som manuskript i avhandlingen, nu publicerad.
Huang, Yizhou. "Outsourced Private Information Retrieval with Pricing and Access Control." Thesis, 2013. http://hdl.handle.net/10012/7576.
Full textAl-Sabah, Mashael. "Network Performance Improvements for Low-Latency Anonymity Networks." Thesis, 2013. http://hdl.handle.net/10012/7424.
Full textBooks on the topic "Privacy-Enhancing Technology"
Registratiekamer, Netherlands, Information and Privacy Commissioner/Ontario, and TNO Physics and Electronics Laboratory., eds. Privacy-enhancing technologies: The path to anonymity. Rijswick, The Netherlands: Registratiekamer, 1995.
Find full textPrivacy-enhancing technologies: The path to anonymity. The Hague: Registratiekamer, 1998.
Find full textPrivacy-enhancing technologies: The path to anonymity (Achtergrondstudies en verkenningen). Information and Privacy Commissioner/Ontario, 1995.
Find full textBook chapters on the topic "Privacy-Enhancing Technology"
Owens, Richard, Ross Fraser, William O’Brien, and Mike Gurski. "Panel Discussion — Conforming Technology to Policy: The Problems of Electronic Health Records." In Privacy Enhancing Technologies, 344. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11423409_22.
Full textHarbach, Marian, Sascha Fahl, Matthias Rieger, and Matthew Smith. "On the Acceptance of Privacy-Preserving Authentication Technology: The Curious Case of National Identity Cards." In Privacy Enhancing Technologies, 245–64. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-39077-7_13.
Full textDecroix, Koen, Bart De Decker, and Vincent Naessens. "Designing Privacy-Enhancing Mobile Applications." In IFIP Advances in Information and Communication Technology, 157–70. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-31668-5_12.
Full textBorking, John. "The Status of Privacy Enhancing Technologies." In IFIP Advances in Information and Communication Technology, 211–46. Boston, MA: Springer US, 2003. http://dx.doi.org/10.1007/978-0-387-35696-9_15.
Full textMartha, Venkata Swamy, Nitin Agarwal, and Srini Ramaswamy. "Enhancing Privacy in Online Social Communities: Can Trust Help Mitigate Privacy Risks?" In Distributed Computing and Internet Technology, 293–98. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-04483-5_30.
Full textAstorga, Jasone, Purificacion Saiz, Eduardo Jacob, and Jon Matias. "A Privacy Enhancing Architecture for Collaborative Working Environments." In IFIP Advances in Information and Communication Technology, 569–76. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-15961-9_68.
Full textDritsas, Stelios, John Tsaparas, and Dimitris Gritzalis. "A Generic Privacy Enhancing Technology for Pervasive Computing Environments." In Trust and Privacy in Digital Business, 103–13. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11824633_11.
Full textWästlund, Erik, Peter Wolkerstorfer, and Christina Köffel. "PET-USES: Privacy-Enhancing Technology – Users’ Self-Estimation Scale." In IFIP Advances in Information and Communication Technology, 266–74. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-14282-6_22.
Full textSuch, Jose M., Agustin Espinosa, and Ana Garcia-Fornes. "An Agent Infrastructure for Privacy-Enhancing Agent-Based E-commerce Applications." In Advanced Agent Technology, 411–25. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-27216-5_31.
Full textIslami, Lejla, Simone Fischer-Hübner, Eunice Naa Korkoi Hammond, and Jan Eloff. "Analysing Drivers’ Preferences for Privacy Enhancing Car-to-Car Communication Systems." In IFIP Advances in Information and Communication Technology, 115–33. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-72465-8_7.
Full textConference papers on the topic "Privacy-Enhancing Technology"
Sampigethaya, Krishna, and Radha Poovendran. "Enhancing Location Privacy of Future Aircraft Wireless Communications." In 10th AIAA Aviation Technology, Integration, and Operations (ATIO) Conference. Reston, Virigina: American Institute of Aeronautics and Astronautics, 2010. http://dx.doi.org/10.2514/6.2010-9157.
Full textO'Leary, Kaitlyn, Claire Reid, Ian Sulivan, Alison Trent, and Vibhavari Jani. "ENHANCING THE AMERICAN CLASSROOM: UTILIZING AUDIO AND VISUAL PRIVACY." In 13th International Technology, Education and Development Conference. IATED, 2019. http://dx.doi.org/10.21125/inted.2019.1849.
Full textShabalala, M. V., P. Tarwireyi, and M. O. Adigun. "Privacy monitoring framework for enhancing transparency in cloud computing." In 2014 IEEE 6th International Conference On Adaptive Science & Technology (ICAST). IEEE, 2014. http://dx.doi.org/10.1109/icastech.2014.7068093.
Full textPramerdorfer, C., M. Kampel, and R. Kreissl. "Behavior detection as a privacy-enhancing security technology in prison cells." In 9th International Conference on Imaging for Crime Detection and Prevention (ICDP-2019). Institution of Engineering and Technology, 2019. http://dx.doi.org/10.1049/cp.2019.1159.
Full textDuncan, Bob, Alfred Bratterud, and Andreas Happe. "Enhancing cloud security and privacy: Time for a new approach?" In 2016 Sixth International Conference on Innovative Computing Technology (INTECH). IEEE, 2016. http://dx.doi.org/10.1109/intech.2016.7845113.
Full textFischer, Lars, Marcel Heupel, Mohamed Bourimi, Dogan Kesdogan, and Rafael Gimenez. "Enhancing privacy in collaborative scenarios utilising a flexible proxy layer." In 2012 International Conference on Future Generation Communication Technology (FGCT). IEEE, 2012. http://dx.doi.org/10.1109/fgct.2012.6476560.
Full textStubing, Hagen, Abdulhadi Shoufan, and Sorin A. Huss. "Enhancing Security and Privacy in C2X Communication by Radiation Pattern Control." In 2010 IEEE 71st Vehicular Technology Conference. IEEE, 2010. http://dx.doi.org/10.1109/vetecs.2010.5494206.
Full textChristofi, Athena, Rob Heyman, Laurens Vandercruysse, Valerie Verdoodt, Caroline Buts, Michael Dooms, Jo Pierson, and Peggy Valcke. "Smart City Privacy: Enhancing Collaborative Transparency in the Regulatory Ecosystem." In 2019 CTTE-FITCE: Smart Cities & Information and Communication Technology (CTTE-FITCE). IEEE, 2019. http://dx.doi.org/10.1109/ctte-fitce.2019.8894824.
Full textArdelean, Petra, and Panagiotis Papadimitratos. "Secure and Privacy-Enhancing Vehicular Communication: Demonstration of Implementation and Operation." In 2008 IEEE 68th Vehicular Technology Conference (VTC 2008-Fall). IEEE, 2008. http://dx.doi.org/10.1109/vetecf.2008.465.
Full textAvorgbedor, Francis, and Jigang Liu. "Enhancing User Privacy Protection by Enforcing Clark-Wilson Security Model on Facebook." In 2020 IEEE International Conference on Electro Information Technology (EIT). IEEE, 2020. http://dx.doi.org/10.1109/eit48999.2020.9208279.
Full text