Academic literature on the topic 'Privacy-Enhancing Technology'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Privacy-Enhancing Technology.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Privacy-Enhancing Technology"

1

Wolfe, Henry B. "Privacy enhancing technology." Computer Fraud & Security 1997, no. 10 (October 1997): 11–15. http://dx.doi.org/10.1016/s1361-3723(97)89951-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Pelkola, David. "A Framework for Managing Privacy-Enhancing Technology." IEEE Software 29, no. 3 (May 2012): 45–49. http://dx.doi.org/10.1109/ms.2012.47.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Javed, Ibrahim Tariq, Fares Alharbi, Tiziana Margaria, Noel Crespi, and Kashif Naseer Qureshi. "PETchain: A Blockchain-Based Privacy Enhancing Technology." IEEE Access 9 (2021): 41129–43. http://dx.doi.org/10.1109/access.2021.3064896.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Huang, Hsiao-Ying, and Masooda Bashir. "The onion router: Understanding a privacy enhancing technology community." Proceedings of the Association for Information Science and Technology 53, no. 1 (2016): 1–10. http://dx.doi.org/10.1002/pra2.2016.14505301034.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kosta, Eleni, Jan Zibuschka, Tobias Scherner, and Jos Dumortier. "Legal considerations on privacy-enhancing Location Based Services using PRIME technology." Computer Law & Security Review 24, no. 2 (January 2008): 139–46. http://dx.doi.org/10.1016/j.clsr.2008.01.006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Namara, Moses, Daricia Wilkinson, Kelly Caine, and Bart P. Knijnenburg. "Emotional and Practical Considerations Towards the Adoption and Abandonment of VPNs as a Privacy-Enhancing Technology." Proceedings on Privacy Enhancing Technologies 2020, no. 1 (January 1, 2020): 83–102. http://dx.doi.org/10.2478/popets-2020-0006.

Full text
Abstract:
AbstractVirtual Private Networks (VPNs) can help people protect their privacy. Despite this, VPNs are not widely used among the public. In this survey study about the adoption and usage of VPNs, we investigate people’s motivation to use VPNs and the barriers they encounter in adopting them. Using data from 90 technologically savvy participants, we find that while nearly all (98%; 88) of the participants have knowledge about what VPNs are, less than half (42%; 37) have ever used VPNs primarily as a privacy-enhancing technology. Of these, 18% (7) abandoned using VPNs while 81% (30) continue to use them to protect their privacy online. In a qualitative analysis of survey responses, we find that people who adopt and continue to use VPNs for privacy purposes are primarily motivated by emotional considerations, including the strong desire to protect their privacy online, wide fear of surveillance and data tracking not only from Internet service providers (ISPs) but also governments and Internet corporations such as Facebook and Google. In contrast, people who are mainly motivated by practical considerations are more likely to abandon VPNs, especially once their practical need no longer exists. These people cite their access to alternative technologies and the effort required to use a VPN as reasons for abandonment. We discuss implications of these findings and provide suggestions on how to maximize adoption of privacy-enhancing technologies such as VPNs, focusing on how to align them with people’s interests and privacy risk evaluation.
APA, Harvard, Vancouver, ISO, and other styles
7

Peltsverger, Svetlana, and Guangzhi Zheng. "Enhancing Privacy Education with a Technical Emphasis in IT Curriculum." Journal of Information Technology Education: Innovations in Practice 15 (2016): 001–17. http://dx.doi.org/10.28945/2330.

Full text
Abstract:
The paper describes the development of four learning modules that focus on technical details of how a person’s privacy might be compromised in real-world scenarios. The paper shows how students benefited from the addition of hands-on learning experiences of privacy and data protection to the existing information technology courses. These learning modules raised students’ awareness of potential breaches of privacy as a user as well as a developer. The demonstration of a privacy breach in action helped students to design, configure, and implement technical solutions to prevent privacy violations. The assessment results demonstrate the strength of the technical approach.
APA, Harvard, Vancouver, ISO, and other styles
8

Furnell, Steven, Rossouw von Solms, and Andy Phippen. "Preventative Actions for Enhancing Online Protection and Privacy." International Journal of Information Technologies and Systems Approach 4, no. 2 (July 2011): 1–11. http://dx.doi.org/10.4018/jitsa.2011070101.

Full text
Abstract:
Many citizens rely upon online services, and it is certain that this reliance will increase in the future. However, they frequently lack a solid appreciation of the related safety and security issues, and can be missing out on an essential aspect of awareness in everyday life. Indeed, users are often concerned about online threats, but it would be stretching the point to claim that they are fully aware of the problems. Thus, rather than actually protecting themselves, many will simply accept that they are taking a risk. This paper examines the problem of establishing end-user eSafety awareness, and proposes means by which related issues can be investigated and addressed. Recognising that long-term attitudes and practices will be shaped by early experiences with the technology, it is particularly important to address the issue early and improve awareness amongst young people. However, the problem is unlikely to be addressed via the approaches that would traditionally be applied with adult users. As such, the paper examines information gathering and awareness-raising strategies drawing from qualitative methodologies in the social sciences, whose pluralistic approach can be effectively applied within school contexts.
APA, Harvard, Vancouver, ISO, and other styles
9

Lahlou, Saadi. "Identity, social status, privacy and face-keeping in digital society." Social Science Information 47, no. 3 (September 2008): 299–330. http://dx.doi.org/10.1177/0539018408092575.

Full text
Abstract:
Digitization of society raises concerns about privacy. This article first describes privacy threats of life-logging. It gives the technically novice reader a quick overview of what information and communication technology (ICT) is currently preparing for society, based on state-of-the art research in the industry laboratories: ubiquitous computing, aware environments, the Internet of Things, and so on. We explain how geolocation systems work and how they can provide detailed accounts of personal activity that will deeply affect privacy. At present, system designers rarely implement privacy-enhancing technologies — we explain why, based on empirical research. On the other hand, users, while expressing concern, do not protect themselves in practice — we list reasons for this. The problem is complex because the very nature of identity and social relations works against protecting personal data; this is the privacy dilemma. At least two key mechanisms in the production of good interaction and in the construction of social status are based on personal data disclosure. Then we discuss the nature of privacy, based on field observation. Privacy loss can be seen as `losing face'. We detail this notion, based on a discussion of the notion of face, and especially the Asian social construct of `Chemyon'. We then propose a new, positive, definition of privacy as `keeping face'. This positive notion can be used to build constructive guidelines for enhancing privacy in systems design, compatible with the way designers perceive their role. These guidelines are presented in an annex, after a short conclusion that advocates a constructive — perhaps risky — role for social science in the construction of future information and communication technology. 1
APA, Harvard, Vancouver, ISO, and other styles
10

Perez, Alfredo, Sherali Zeadally, Luis Matos Garcia, Jaouad Mouloud, and Scott Griffith. "FacePET: Enhancing Bystanders’ Facial Privacy with Smart Wearables/Internet of Things." Electronics 7, no. 12 (December 3, 2018): 379. http://dx.doi.org/10.3390/electronics7120379.

Full text
Abstract:
Given the availability of cameras in mobile phones, drones and Internet-connected devices, facial privacy has become an area of major interest in the last few years, especially when photos are captured and can be used to identify bystanders’ faces who may have not given consent for these photos to be taken and be identified. Some solutions to protect facial privacy in photos currently exist. However, many of these solutions do not give a choice to bystanders because they rely on algorithms that de-identify photos or protocols to deactivate devices and systems not controlled by bystanders, thereby being dependent on the bystanders’ trust in these systems to protect his/her facial privacy. To address these limitations, we propose FacePET (Facial Privacy Enhancing Technology), a wearable system worn by bystanders and designed to enhance facial privacy. We present the design, implementation, and evaluation of the FacePET and discuss some open research issues.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Privacy-Enhancing Technology"

1

Ripmann, Nina. "User Interface Design for Privacy Enhancing Technology." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for telematikk, 2012. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-18731.

Full text
Abstract:
A significant amount of information is available of us online due to the increased use of the Internet and online services. It appears to be a tendency among users to not read privacy policies when creating user accounts online because policies are known to be long and complicated documents that are hard to understand. Users also feel like they don't really have a choice than to accept the policy if they want to use the service. This have created privacy concerns and a need for better privacy control for users, since the users usually don't know what they have agreed to when accepting policies.SINTEF ICT have developed a privacy enhancing technology (PET), named Privacy Advisor, whose purpose is to help users think about privacy and information sharing online. This is done by Privacy Advisor interpreting webpages privacy policies for the users and giving advices on whether the webpages should be trusted or not. The users are then given the opportunity to provide feedback to Privacy Advisor and the system will use this to adapt to the users privacy preferences. A graphical user interface (GUI) for Privacy Advisor were developed using prototyping with iterative improvement of the design, based on feedback from SINTEF ICT and potential users. Feedback from users was collected by performing usability testing with observation, followed by a questionnaire. Usability testing was also conducted to determine the designs usability and find breakdowns in the design. The feedback showed that there were some breakdowns in the system. These were presentation of text that was confusing for some users, where they did not understand the meaning of the text, or buttons that was not intuitive enough. These breakdowns were fixed for the final version of the design suggestion. The users also navigated well in the prototype and managed to complete all the given tasks. The system also received positive feedback concerning further use and the need for a program like Privacy Advisor, and because of these elements, the usability were determined as good when the final improvements and fixing of breakdowns were completed. A final design for Privacy Advisor, implemented as a Google Chrome extension was then presented to SINTEF ICT.
APA, Harvard, Vancouver, ISO, and other styles
2

Van, Staden W. J. S. (Wynand Johannes Christiaan). "A model for compound purposes and reasons as a privacy enhancing technology in a relational database." Thesis, University of Pretoria, 2011. http://hdl.handle.net/2263/26818.

Full text
Abstract:
The protection of privacy related information of the individual is receiving increasing attention. Particular focus is on the protection of user interaction with other users or service providers. Protection of this interaction centres on anonymising the user’s actions, or protecting “what we do”. An equally important aspect is protecting the information related to a user that is stored in some electronic way (or protecting “who we are”). This may be profile information on a social networking site, or personal information in a bank’s database. A typical approach to protecting the user (data owner) in this case is to tag their data with the “purpose” the collecting entity (data controller) has for the data. These purposes are in most cases singular in nature (there is “one” purpose – no combinations of purposes – of the data), and provide little in the way of flexibility when specifying a privacy policy. Moreover, in all cases the user accessing the data (data user) does little to state their intent with the data. New types of purposes called compound purposes, which are combinations of singular or other compound purposes, are proposed and examined in this text. In addition to presenting the notion of compound purposes, compound reasons are also presented. Compound reasons represent the intent of the entity using the data (the data user) with the data. Also considered are the benefits of having the data user specifying their intent with data explicitly, the verification of compound reasons (the data user’s statement of intent) against compound purposes, the integration of compound statements in existing technologies such as SQL by providing a model for using compound purposes and reasons in a relational database management system for protecting privacy, and the use of compounds (purposes and reasons) as a method for managing privacy agreements.
Thesis (PhD)--University of Pretoria, 2011.
Computer Science
unrestricted
APA, Harvard, Vancouver, ISO, and other styles
3

Agrafiotis, Ioannis. "Enhancing user's privacy : developing a model for managing and testing the lifecycle of consent and revocation." Thesis, University of Warwick, 2012. http://wrap.warwick.ac.uk/57981/.

Full text
Abstract:
Increasingly, people turn to the Internet for access to services, which often require disclosure of a significant amount of personal data. Networked technologies have enabled an explosive growth in the collection, storage and processing of personal information with notable commercial potential. However, there are asymmetries in relation to how people are able to control their own information when handled by enterprises. This raises significant privacy concerns and increases the risk of privacy breaches, thus creating an imperative need for mechanisms offering information control functionalities. To address the lack of controls in online environments, this thesis focuses on consent and revocation mechanisms to introduce a novel approach for controlling the collection, usage and dissemination of personal data and managing privacy ex- pectations. Drawing on an extensive multidisciplinary review on privacy and on empirical data from focus groups, this research presents a mathematical logic as the foundation for the management of consent and revocation controls in technological systems. More specifically, this work proposes a comprehensive conceptual model for con- sent and revocation and introduces the notion of 'informed revocation'. Based on this model, a Hoare-style logic is developed to capture the effects of expressing indi- viduals' consent and revocation preferences. The logic is designed to support certain desirable properties, defined as healthiness conditions. Proofs that these conditions hold are provided with the use of Maude software. This mathematical logic is then verified in three real-world case study applications with different consent and revocation requirements for the management of employee data in a business envi- ronment, medical data in a biobank and identity assurance in government services. The results confirm the richness and the expressiveness of the logic. In addition, a novel testing strategy underpinned by this logic is presented. This strategy is able to generate testing suites for systems offering consent and revocation controls, such as the EnCoRe system, where testing was carried out successfully and resulted in identifying faults in the EnCoRe implementation.
APA, Harvard, Vancouver, ISO, and other styles
4

Tillwick, Heiko Mark. "Polar proxies collaborating to achieve anonymous web browsing /." Diss., Pretoria : [s.n.], 2007. http://upetd.up.ac.za/thesis/available/etd-07052007-115229.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Lindegren, Daniel. "Designing for user awareness and usability : An evaluation of authorization dialogs on a mobile device." Thesis, Karlstads universitet, Handelshögskolan, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-62731.

Full text
Abstract:
Personal data is often disclosed with every registration, sharing, or request of an online service. With the increased usage of things connected to the Internet, users' information being collected and stored, the risks related to unknowingly sharing personal data increases. Sharing of personal information is a sensitive subject and can hurt people’s assets, dignity, personal integrity and other social aspects. In general, users’ concerns have grown regarding protecting their personal information which has led to the development of multiple privacy-oriented systems. In scenarios where users are logging onto a website or system, they rarely notice, understand or have desire to read the conditions to which they are implicitly agreeing. These systems are often referred to as identity management systems or single sign-on systems. Recent studies have shown that users are not aware of what data transactions take place by using various authentication solutions. It is critical for these types of system dealing with privacy that researchers examine users' understanding of the concepts through interface design. The purpose of this study is to investigate the usability and user awareness of data transactions for identity management systems on mobile devices by constructing and evaluating different design concepts. Therefore, four different mobile prototypes were designed (called CREDENTIAL Wallet) and explored to measure the usability and also the user awareness of users’ disclosures. 20 usability tests were conducted per prototype. Multiple conclusions can be drawn from this study. The findings showed that the drag-and-drop prototype scored a high user awareness score in terms of participants remembering their shared data and having a good idea of them not sharing more data than they had actually shared. Consequently, the drag-and-drop prototype achieved the highest usability result. A prototype that utilized swiping was created to fit the mobile medium. The prototype showed the highest user awareness score in the context of participants stating what data they had shared. However, people using the swiping prototype thought they were sharing more data than they actually were. Data show that users have an incorrect mental model of the sharing of their fingerprint pattern. Finally, the writing concerns recommendations and challenges of identity management systems – e.g. the importance of tutorial screens. Future studies within the CREDENTIAL project are already underway concerning users' incorrect mental model of sharing fingerprint to the service provider side.
CREDENTIAL
APA, Harvard, Vancouver, ISO, and other styles
6

Maus, Benjamin. "Designing Usable Transparency for Mobile Health Research: The impact of transparency enhancing tools on the users’ trust in citizen science apps." Thesis, Malmö universitet, Fakulteten för kultur och samhälle (KS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-21637.

Full text
Abstract:
Medical researchers are exploring the potential of patients’ mobile phones and wearables for medical studies. The contribution of volunteers in a form of citizen science, where citizens donate their data for research purposes, can enable studies on a large scale. This research area, known as mobile health, often relies on shared data such as tracked steps or self- reporting forms. Privacy, transparency and trust play a fundamental role in the interaction of users with related platforms that agglomerate medical studies.This project explores privacy concerns of potential users of mobile health citizen science apps, summarises similar user patterns and analyses the impact of transparency enhancing tools on the users’ trust. In this context, a prototype with different features that aim to increase the transparency is designed, tested and evaluated. The results indicate how users perceive the importance and the generated trust of the proposed features and provide recommendations for data donation platforms.
APA, Harvard, Vancouver, ISO, and other styles
7

Purra, Joel. "Swedes Online: You Are More Tracked Than You Think." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-117075.

Full text
Abstract:
When you are browsing websites, third-party resources record your online habits; such tracking can be considered an invasion of privacy. It was previously unknown how many third-party resources, trackers and tracker companies are present in the different classes of websites chosen: globally popular websites, random samples of .se/.dk/.com/.net domains and curated lists of websites of public interest in Sweden. The in-browser HTTP/HTTPS traffic was recorded while downloading over 150,000 websites, allowing comparison of HTTPS adaption and third-party tracking within and across the different classes of websites. The data shows that known third-party resources including known trackers are present on over 90% of most classes, that third-party hosted content such as video, scripts and fonts make up a large portion of the known trackers seen on a typical website and that tracking is just as prevalent on secure as insecure sites. Observations include that Google is the most widespread tracker organization by far, that content is being served by known trackers may suggest that trackers are moving to providing services to the end user to avoid being blocked by privacy tools and ad blockers, and that the small difference in tracking between using HTTP and HTTPS connections may suggest that users are given a false sense of privacy when using HTTPS.

Source code, datasets, and a video recording of the presentation is available on the master's thesis website.

APA, Harvard, Vancouver, ISO, and other styles
8

Murmann, Patrick. "Towards Usable Transparency via Individualisation." Licentiate thesis, Karlstads universitet, Institutionen för matematik och datavetenskap (from 2013), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-71120.

Full text
Abstract:
The General Data Protection Regulation grants data subjects the legal rights of transparency and intervenability. Ex post transparency provides users of data services with insight into how their personal data have been processed, and potentially clarifies what consequences will or may arise due to the processing of their data. Technological artefacts, ex post transparency-enhancing tools (TETs) convey such information to data subjects, provided the TETs are designed to suit the predisposition of their audience. Despite being a prerequisite for transparency, however, many of the TETs available to date lack usability in that their capabilities do not reflect the needs of their final users. The objective of this thesis is therefore to systematically apply the concept of human-centred design to ascertain design principles that demonstrably lead to the implementation of a TET that facilitates ex post transparency and supports intervenability. To this end, we classify the state of the art of usable ex post TETs published in the literature and discuss the gaps therein. Contextualising our findings in the domain of fitness tracking, we investigate to what extent individualisation can help accommodate the needs of users of online mobile health services. We introduce the notion of privacy notifications as a means to inform data subjects about incidences worthy of their attention and examine how far privacy personas reflect the preferences of distinctive groups of recipients. We suggest a catalogue of design guidelines that can serve as a basis for specifying context-sensitive requirements for the implementation of a TET that leverages privacy notifications to facilitate ex post transparency, and which also serve as criteria for the evaluation of a future prototype.

Paper 2 ingick som manuskript i avhandlingen, nu publicerad.

APA, Harvard, Vancouver, ISO, and other styles
9

Huang, Yizhou. "Outsourced Private Information Retrieval with Pricing and Access Control." Thesis, 2013. http://hdl.handle.net/10012/7576.

Full text
Abstract:
We propose a scheme for outsourcing Private Information Retrieval (PIR) to untrusted servers while protecting the privacy of the database owner as well as that of the database clients. We observe that by layering PIR on top of an Oblivious RAM (ORAM) data layout, we provide the ability for the database owner to perform private writes, while database clients can perform private reads from the database even while the owner is offline. We can also enforce pricing and access control on a per-record basis for these reads. This extends the usual ORAM model by allowing multiple database readers without requiring trusted hardware; indeed, almost all of the computation in our scheme during reads is performed by untrusted cloud servers. Built on top of a simple ORAM protocol, we implement a real system as a proof of concept. Our system privately updates a 1 MB record in a 16 GB database with an average end-to-end overhead of 1.22 seconds and answers a PIR query within 3.5 seconds over a 2 GB database. We make an observation that the database owner can always conduct a private read as an ordinary database client, and the private write protocol does not have to provide a "read" functionality as a standard ORAM protocol does. Based on this observation, we propose a second construction with the same privacy guarantee, but much faster. We also implement a real system for this construction, which privately writes a 1 MB record in a 1 TB database with an amortized end-to-end response time of 313 ms. Our first construction demonstrates the fact that a standard ORAM protocol can be used for outsourcing PIR computations in a privacy-friendly manner, while our second construction shows that an ad-hoc modification of the standard ORAM protocol is possible for our purpose and allows more efficient record updates.
APA, Harvard, Vancouver, ISO, and other styles
10

Al-Sabah, Mashael. "Network Performance Improvements for Low-Latency Anonymity Networks." Thesis, 2013. http://hdl.handle.net/10012/7424.

Full text
Abstract:
While advances to the Internet have enabled users to easily interact and exchange information online, they have also created several opportunities for adversaries to prey on users’ private information. Whether the motivation for data collection is commercial, where service providers sell data for marketers, or political, where a government censors, blocks and tracks its people, or even personal, for cyberstalking purposes, there is no doubt that the consequences of personal information leaks can be severe. Low-latency anonymity networks have thus emerged as a solution to allow people to surf the Internet without the fear of revealing their identities or locations. In order to provide anonymity to users, anonymity networks route users’ traffic through several intermediate relays, which causes unavoidable extra delays. However, although these networks have been originally designed to support interactive applications, due to a variety of design weaknesses, these networks offer anonymity at the expense of further intolerable performance costs, which disincentivize users from adopting these systems. In this thesis, we seek to improve the network performance of low-latency anonymity networks while maintaining the anonymity guarantees they provide to users today. As an experimentation platform, we use Tor, the most widely used privacy-preserving network that empowers people with low-latency anonymous online access. Since its introduction in 2003, Tor has successfully evolved to support hundreds of thousands of users using thousands of volunteer-operated routers run all around the world. Incidents of sudden increases in Tor’s usage, coinciding with global political events, confirm the importance of the Tor network for Internet users today. We identify four key contributors to the performance problems in low-latency anonymity networks, exemplified by Tor, that significantly impact the experience of low-latency application users. We first consider the lack of resources problem due to the resource-constrained routers, and propose multipath routing and traffic splitting to increase throughput and improve load balancing. Second, we explore the poor quality of service problem, which is exacerbated by the existence of bandwidth-consuming greedy applications in the network. We propose online traffic classification as a means of enabling quality of service for every traffic class. Next, we investigate the poor transport design problem and propose a new transport layer design for anonymous communication networks which addresses the drawbacks of previous proposals. Finally, we address the problem of the lack of congestion control by proposing an ATM-style credit-based hop-by-hop flow control algorithm which caps the queue sizes and allows all relays to react to congestion in the network. Our experimental results confirm the significant performance benefits that can be obtained using our privacy-preserving approaches.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Privacy-Enhancing Technology"

1

Registratiekamer, Netherlands, Information and Privacy Commissioner/Ontario, and TNO Physics and Electronics Laboratory., eds. Privacy-enhancing technologies: The path to anonymity. Rijswick, The Netherlands: Registratiekamer, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Privacy-enhancing technologies: The path to anonymity. The Hague: Registratiekamer, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Privacy-enhancing technologies: The path to anonymity (Achtergrondstudies en verkenningen). Information and Privacy Commissioner/Ontario, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Privacy-Enhancing Technology"

1

Owens, Richard, Ross Fraser, William O’Brien, and Mike Gurski. "Panel Discussion — Conforming Technology to Policy: The Problems of Electronic Health Records." In Privacy Enhancing Technologies, 344. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11423409_22.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Harbach, Marian, Sascha Fahl, Matthias Rieger, and Matthew Smith. "On the Acceptance of Privacy-Preserving Authentication Technology: The Curious Case of National Identity Cards." In Privacy Enhancing Technologies, 245–64. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-39077-7_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Decroix, Koen, Bart De Decker, and Vincent Naessens. "Designing Privacy-Enhancing Mobile Applications." In IFIP Advances in Information and Communication Technology, 157–70. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-31668-5_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Borking, John. "The Status of Privacy Enhancing Technologies." In IFIP Advances in Information and Communication Technology, 211–46. Boston, MA: Springer US, 2003. http://dx.doi.org/10.1007/978-0-387-35696-9_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Martha, Venkata Swamy, Nitin Agarwal, and Srini Ramaswamy. "Enhancing Privacy in Online Social Communities: Can Trust Help Mitigate Privacy Risks?" In Distributed Computing and Internet Technology, 293–98. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-04483-5_30.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Astorga, Jasone, Purificacion Saiz, Eduardo Jacob, and Jon Matias. "A Privacy Enhancing Architecture for Collaborative Working Environments." In IFIP Advances in Information and Communication Technology, 569–76. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-15961-9_68.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Dritsas, Stelios, John Tsaparas, and Dimitris Gritzalis. "A Generic Privacy Enhancing Technology for Pervasive Computing Environments." In Trust and Privacy in Digital Business, 103–13. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11824633_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Wästlund, Erik, Peter Wolkerstorfer, and Christina Köffel. "PET-USES: Privacy-Enhancing Technology – Users’ Self-Estimation Scale." In IFIP Advances in Information and Communication Technology, 266–74. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-14282-6_22.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Such, Jose M., Agustin Espinosa, and Ana Garcia-Fornes. "An Agent Infrastructure for Privacy-Enhancing Agent-Based E-commerce Applications." In Advanced Agent Technology, 411–25. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-27216-5_31.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Islami, Lejla, Simone Fischer-Hübner, Eunice Naa Korkoi Hammond, and Jan Eloff. "Analysing Drivers’ Preferences for Privacy Enhancing Car-to-Car Communication Systems." In IFIP Advances in Information and Communication Technology, 115–33. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-72465-8_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Privacy-Enhancing Technology"

1

Sampigethaya, Krishna, and Radha Poovendran. "Enhancing Location Privacy of Future Aircraft Wireless Communications." In 10th AIAA Aviation Technology, Integration, and Operations (ATIO) Conference. Reston, Virigina: American Institute of Aeronautics and Astronautics, 2010. http://dx.doi.org/10.2514/6.2010-9157.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

O'Leary, Kaitlyn, Claire Reid, Ian Sulivan, Alison Trent, and Vibhavari Jani. "ENHANCING THE AMERICAN CLASSROOM: UTILIZING AUDIO AND VISUAL PRIVACY." In 13th International Technology, Education and Development Conference. IATED, 2019. http://dx.doi.org/10.21125/inted.2019.1849.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Shabalala, M. V., P. Tarwireyi, and M. O. Adigun. "Privacy monitoring framework for enhancing transparency in cloud computing." In 2014 IEEE 6th International Conference On Adaptive Science & Technology (ICAST). IEEE, 2014. http://dx.doi.org/10.1109/icastech.2014.7068093.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Pramerdorfer, C., M. Kampel, and R. Kreissl. "Behavior detection as a privacy-enhancing security technology in prison cells." In 9th International Conference on Imaging for Crime Detection and Prevention (ICDP-2019). Institution of Engineering and Technology, 2019. http://dx.doi.org/10.1049/cp.2019.1159.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Duncan, Bob, Alfred Bratterud, and Andreas Happe. "Enhancing cloud security and privacy: Time for a new approach?" In 2016 Sixth International Conference on Innovative Computing Technology (INTECH). IEEE, 2016. http://dx.doi.org/10.1109/intech.2016.7845113.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Fischer, Lars, Marcel Heupel, Mohamed Bourimi, Dogan Kesdogan, and Rafael Gimenez. "Enhancing privacy in collaborative scenarios utilising a flexible proxy layer." In 2012 International Conference on Future Generation Communication Technology (FGCT). IEEE, 2012. http://dx.doi.org/10.1109/fgct.2012.6476560.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Stubing, Hagen, Abdulhadi Shoufan, and Sorin A. Huss. "Enhancing Security and Privacy in C2X Communication by Radiation Pattern Control." In 2010 IEEE 71st Vehicular Technology Conference. IEEE, 2010. http://dx.doi.org/10.1109/vetecs.2010.5494206.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Christofi, Athena, Rob Heyman, Laurens Vandercruysse, Valerie Verdoodt, Caroline Buts, Michael Dooms, Jo Pierson, and Peggy Valcke. "Smart City Privacy: Enhancing Collaborative Transparency in the Regulatory Ecosystem." In 2019 CTTE-FITCE: Smart Cities & Information and Communication Technology (CTTE-FITCE). IEEE, 2019. http://dx.doi.org/10.1109/ctte-fitce.2019.8894824.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Ardelean, Petra, and Panagiotis Papadimitratos. "Secure and Privacy-Enhancing Vehicular Communication: Demonstration of Implementation and Operation." In 2008 IEEE 68th Vehicular Technology Conference (VTC 2008-Fall). IEEE, 2008. http://dx.doi.org/10.1109/vetecf.2008.465.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Avorgbedor, Francis, and Jigang Liu. "Enhancing User Privacy Protection by Enforcing Clark-Wilson Security Model on Facebook." In 2020 IEEE International Conference on Electro Information Technology (EIT). IEEE, 2020. http://dx.doi.org/10.1109/eit48999.2020.9208279.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography