Abstract—Location obfuscation using cloaking regions preserves location anonymity by hiding the true user among a set of other equally likely users. Furthermore, a cloaking regio...
In this paper, we explore a privacy algorithm that detects human private parts in a 3D scan data set. The analogia graph is introduced to study the proportion of structures. The i...
Assume that a client outsources his database to a remote storage-provider (the server), so that for privacy reasons, the client's database is encrypted by his secret key. Duri...
In logic metaprogramming, programs are not stored as plain textfiles but rather derived from a deductive database. While the benefits of this approach for metaprogramming are ob...
Abstract. With the digitization of society and the continuous migration of services to the electronic world, individuals have lost significant control over their data. In this pap...