Sciweavers

2272 search results - page 22 / 455
» Provable Data Privacy
Sort
View
ESORICS
2009
Springer
14 years 2 months ago
The UNESCO Chair in Data Privacy Research in Vehicular Networks
An overview of the activities of the UNESCO Chair in Data Privacy is first given. One of these activities is research. We focus on the research conducted to conciliate security an...
Josep Domingo-Ferrer
ICDE
2005
IEEE
63views Database» more  ICDE 2005»
14 years 1 months ago
Privacy Contracts as an Extension of Privacy Policies
Individuals are becoming increasingly concerned regarding the protection of their personal information. In an attempt to ease the privacy concerns of individuals, organisations pu...
Hendrik J. G. Oberholzer, Martin S. Olivier
CIS
2005
Springer
14 years 1 months ago
A New Conceptual Framework Within Information Privacy: Meta Privacy
When considering information security and privacy issues most of the attention has previously focussed on data protection and the privacy of personally identifiable information (PI...
Geoff Skinner, Song Han, Elizabeth Chang
CCS
1993
ACM
13 years 12 months ago
On Simple and Secure Key Distribution
Many recent research e orts in computer security focus on constructing provably secure authentication protocols. Although many of the resulting protocols rely on the a priori secu...
Gene Tsudik, Els Van Herreweghen
IEEEARES
2009
IEEE
14 years 2 months ago
Linking Privacy Solutions to Developer Goals
Privacy is gaining importance since more and more data becomes digitalized. There is also a growing interest from the security community because of the existing synergy between se...
Kim Wuyts, Riccardo Scandariato, Bart De Decker, W...