Sciweavers

841 search results - page 58 / 169
» RFIDs and Personal Privacy
Sort
View
158
Voted
EDBT
2012
ACM
262views Database» more  EDBT 2012»
13 years 6 months ago
The application of differential privacy to health data
Differential privacy has gained a lot of attention in recent years as a general model for the protection of personal information when used and disclosed for secondary purposes. It...
Fida Kamal Dankar, Khaled El Emam
113
Voted
IEEEARES
2009
IEEE
15 years 10 months ago
Generating User-Understandable Privacy Preferences
—Making use of the World Wide Web’s numerous services increasingly requires the disclosure of personal user data. While these data represent an important value for service prov...
Jan Kolter, Günther Pernul
130
Voted
CCS
2007
ACM
15 years 7 months ago
Covert channels in privacy-preserving identification systems
We examine covert channels in privacy-enhanced mobile identification devices where the devices uniquely identify themselves to an authorized verifier. Such devices (e.g. RFID tags)...
Daniel V. Bailey, Dan Boneh, Eu-Jin Goh, Ari Juels
145
Voted
IEEEARES
2008
IEEE
15 years 10 months ago
A Post-processing Method to Lessen k-Anonymity Dissimilarities
Protecting personal data is essential to guarantee the rule of law1 . Due to the new Information and Communication Technologies (ICTs) unprecedented amounts of personal data can b...
Agusti Solanas, Gloria Pujol, Antoni Martín...
111
Voted
ICIS
2004
15 years 5 months ago
Opting-in or Opting-out on the Internet: Does it Really Matter?
Personal privacy has become one of the pressure points that comprises utmost primacy in the scientific community. An often debated privacy issue concerns the means of soliciting c...
Yee-Lin Lai, Kai Lung Hui