Sciweavers

3395 search results - page 24 / 679
» Computational Differential Privacy
Sort
View
ACISP
2010
Springer
13 years 11 months ago
Distinguishers for the Compression Function and Output Transformation of Hamsi-256
Hamsi is one of 14 remaining candidates in NIST's Hash Competition for the future hash standard SHA-3. Until now, little analysis has been published on its resistance to diffe...
Jean-Philippe Aumasson, Emilia Käsper, Lars R...
CHI
2009
ACM
14 years 10 months ago
Designing a privacy label: assisting consumer understanding of online privacy practices
This project describes the continuing development of a Privacy Label to present to consumers the ways organizations collect, use, and share personal information. Several studies h...
Patrick Gage Kelley
CIS
2005
Springer
14 years 3 months ago
A New Conceptual Framework Within Information Privacy: Meta Privacy
When considering information security and privacy issues most of the attention has previously focussed on data protection and the privacy of personally identifiable information (PI...
Geoff Skinner, Song Han, Elizabeth Chang
CHI
2004
ACM
14 years 10 months ago
Privacy policies as decision-making tools: an evaluation of online privacy notices
Studies have repeatedly shown that users are increasingly concerned about their privacy when they go online. In response to both public interest and regulatory pressures, privacy ...
Carlos Jensen, Colin Potts
ISSAC
2007
Springer
112views Mathematics» more  ISSAC 2007»
14 years 4 months ago
Differential forms in computational algebraic geometry
Peter Bürgisser, Peter Scheiblechner