Sciweavers

515 search results - page 7 / 103
» Measuring Voter-Controlled Privacy
Sort
View
INTERACT
2007
13 years 9 months ago
Do I Do What I Say?: Observed Versus Stated Privacy Preferences
Abstract. This paper examines the use of surveys in measuring privacy concerns in ubiquitous computing environments. Two evaluation techniques are used to study the privacy concern...
Kay Connelly, Ashraf Khalil, Yong Liu
SSDBM
2011
IEEE
234views Database» more  SSDBM 2011»
12 years 11 months ago
Privacy Preserving Group Linkage
The problem of privacy-preserving record linkage is to find the intersection of records from two parties, while not revealing any private records to each other. Recently, group li...
Fengjun Li, Yuxin Chen, Bo Luo, Dongwon Lee, Peng ...
CCS
2011
ACM
12 years 7 months ago
Televisions, video privacy, and powerline electromagnetic interference
We conduct an extensive study of information leakage over the powerline infrastructure from eight televisions (TVs) spanning multiple makes, models, and underlying technologies. I...
Miro Enev, Sidhant Gupta, Tadayoshi Kohno, Shwetak...
COMSNETS
2012
183views more  COMSNETS 2012»
12 years 3 months ago
Effects of network trace sampling methods on privacy and utility metrics
—Researchers choosing to share wireless-network traces with colleagues must first anonymize sensitive information, trading off the removal of information in the interest of iden...
Phil Fazio, Keren Tan, David Kotz
ISSA
2008
13 years 9 months ago
The Principle of Security Safeguards: Accidental Activities
The principle of information security safeguards is a key information principle contained in every privacy legislation measure, framework, and guideline. This principle requires d...
Rasika Dayarathna