Search Results - "privacy"
Suggested Topics within your search.
Suggested Topics within your search.
- Computational Intelligence 80
- Computational intelligence 80
- Communications Engineering, Networks 58
- Telecommunication 58
- Artificial Intelligence 47
- Artificial intelligence 47
- Data protection 33
- Signal processing 32
- Signal, Speech and Image Processing 32
- Data and Information Security 31
- Application software 20
- Computer and Information Systems Applications 20
- Data Mining and Knowledge Discovery 20
- Data mining 20
- Computer networks 18
- Computer Communication Networks 14
- Human-computer interaction 14
- User Interfaces and Human Computer Interaction 14
- User interfaces (Computer systems) 14
- Control engineering 11
- Big Data 10
- Big data 10
- Data Analysis and Big Data 10
- Electronic Circuits and Systems 10
- Electronic circuits 10
- Quantitative research 10
- Electronics 8
- Electronics and Microelectronics, Instrumentation 8
- Automation 7
- Control, Robotics, Automation 7
-
1
-
2
Biometric Security and Privacy Opportunities & Challenges in The Big Data Era /
Published 2017Table of Contents: “…-- A Survey on Soft Biometrics for Forensic Analysis -- Robust Biometric Verification with Low Quality Data -- Streamed Biometric Verification for Big Data Challenge -- Privacy-Protected Biometric Verification for Security Applications -- Part III - New Applications using Biometrics -- Biometric Key Generation using Fuzzy Extractor for Mobile Banking -- Securing Electronic Medical Records Using Biometric Authentication -- Body Biometrics from MRI Images for Medicine Advice -- Identify Invisible Persons inSocial Network -- From Memory to Human Recognition in Cognitive Robots.…”
Full-text access
View in OPAC
e-Book -
3
Secrecy, Privacy and Accountability Challenges for Social Research /
Published 2019Table of Contents: “…Trust, Transparency and Privacy. .…”
Full-text access
View in OPAC
e-Book -
4
Situational Privacy and Self-Disclosure Communication Processes in Online Environments /
Published 2019Table of Contents: “…New Media Environments and Their Threats -- 3. Theories of Privacy -- 4. Theories of Self-Disclosure -- 5. Connecting Privacy and Self-Disclosure -- 6. …”
Full-text access
View in OPAC
e-Book -
5
Drones and the law : international responses to rapid drone proliferation /
Published 2020Table of Contents: “…Chapter 1: Historical Introduction and Technology Used in Drones -- Chapter 2: Legality of Drones Under LOAC and International Law -- Chapter 3: Legal Justifications for the Drone Targeted Killing -- Chapter 4: Point Forward: Legitimate Concerns about Drones' Proliferation -- Chapter 5: Drones Present and Future Privacy Laws: A Comparative Study of the U.S., U.K., and India.…”
Full-text access
View in OPAC
e-Book -
6
On Privacy-Preserving Protocols for Smart Metering Systems Security and Privacy in Smart Grids /
Published 2017Table of Contents: “…Part I: Foundations -- Introduction -- Background and Models -- A Selective Review -- Part II: Contributions -- Reasons to Measure Frequently and Their Requirements -- Quantifying the Aggregation Size -- Selected Privacy-Preserving Protocols -- Analytical Comparison -- Simulation and Validation -- Concluding Remarks.…”
Full-text access
View in OPAC
e-Book -
7
Smart Grids: Security and Privacy Issues
Published 2017Table of Contents: “…Overview of the Security and Privacy Issues in Smart Grids -- I Physical Network Security -- Reliability in Smart Grids -- Error Detection of DC Power Flow using State Estimation -- Bad Data Detection -- II Information Network Security -- Cloud Network Data Security -- III Privacy Preservation -- End-User Data Privacy -- Mobile User Data Privacy.…”
Full-text access
View in OPAC
e-Book -
8
Compressed Sensing for Privacy-Preserving Data Processing
Published 2019Table of Contents: “…Introduction -- Compressed Sensing and Security -- Compressed Sensing as a Cryptosystem -- Privacy-preserving Embeddings -- Conclusion.…”
Full-text access
View in OPAC
e-Book -
9
Big Data Privacy Preservation for Cyber-Physical Systems
Published 2019Table of Contents: “…Chapter 1 Cyber-Physical Systems -- Chapter 2 Preliminaries -- Chapter 3 Spectrum Trading with Secondary Users' Privacy Protection -- Chapter 4 Optimization for Utility Providers with Privacy Preservation of Users' Energy Profile -- Chapter 5 Caching with Users' Differential Privacy Preservation in Information-Centric Networks -- Chapter 6 Clock Auction Inspired Privacy Preservation in Colocation Data Centers.…”
Full-text access
View in OPAC
e-Book -
10
Secure and Privacy-Preserving Data Communication in Internet of Things
Published 2017Table of Contents: “…Introduction -- Secure Data Aggregation in Wireless Sensor Network -- Privacy preserving Meter Reading Transmission in Smart Grid -- Key Agreement and Management in Vehicular Ad-hoc Network -- Conclusion.…”
Full-text access
View in OPAC
e-Book -
11
Data Privacy: Foundations, New Developments and the Big Data Challenge
Published 2017Table of Contents: “…Introduction -- Machine and Statistical Learning -- On the Classification of Protection Procedures -- User's privacy -- Privacy Models and Disclosure Risk Measures -- Masking methods -- Information loss: evaluation and measures -- Selection of masking methods -- Conclusions.…”
Full-text access
View in OPAC
e-Book -
12
-
13
-
14
Women Securing the Future with TIPPSS for IoT Trust, Identity, Privacy, Protection, Safety, Security for the Internet of Things /
Published 2019Table of Contents: “…Introduction -- End to end trust and security for the Internet of Things -- Wise Information Security across the globe -- Secure hardware technology for IoT -- Defense in depth strategies to secure IoT devices -- Safety and security of Cyber Physical Systems -- Securing the endpoints in a connected world -- Securing healthcare devices - The Internet of Biomedical Things -- Protection of the elderly - Elder care robot TIPPSS for IoT -- Process and culture opportunities to address cybersecurity challenges -- Developing the ecosystem for TIPPSS for IoT -- Trust and Identify solutions for IoT -- Privacy and policy implications for IoT -- Blockchain potential to enable TIPPSS for IoT -- Conclusion.…”
Full-text access
View in OPAC
e-Book -
15
-
16
The Swedish microchipping phenomenon /
Published 2019Subjects: Full-text access
View in OPAC
e-Book -
17
-
18
-
19
Internet of Things Security and Data Protection
Published 2019Table of Contents: “…Internet of Things Cybersecurity Paradigm Shift, Threats Matrix and Practical Taxonomy -- Chapter 2. Privacy and Security Threats on the Internet of Things -- Chapter 3. …”
Full-text access
View in OPAC
e-Book -
20
Proceedings of International Symposium on Sensor Networks, Systems and Security Advances in Computing and Networking with Applications /
Published 2018Table of Contents: “…Introduction -- Part I: Privacy and game theory -- A Novel Perfect Privacy PIR scheme for Privacy Critical Applications -- Heterogeneous Sensor Privacy Protection with Stackelberg Privacy Games -- Intelligent Access Control: A Self-Adaptable Trust Based Access Control Framework (SATBAC) using Game Theory Strategy -- Public Key Cryptosystem for Privacy Sensitive Location Based Services -- Stochastic Tools for Network Intrusion Detection -- Part II: High performance computing and the cloud -- Accelerating the Big Data Analytics by GPU based Machine Learning: A Survey -- Multimedia Data Management for Disaster Situation Awareness -- On the Need of Security Standards in Big Data Information Flow -- Using Markov models and statistics to learn, extract, fuse, and detect patterns in raw data -- Dynamic Firewall Policy Management Framework for Private Cloud -- Security threats and solutions for virtualization and migration in virtual machines -- Techniques to certify integrity and proof of existence for a periodical re-encryption based long term archival systems -- Part III: Networking and the Internet of Things (IoT) -- A Study of Contact Durations for Vehicle to Vehicle Communications -- Evolution of Sensors leading to Smart Objects and Security Issues in IoT -- Flexible Bandwidth Scheduling for Streaming Data Movement Over Dedicated Networks -- Internet of Things: Current Trends and Emerging Prospects -- Measurements and Analytics of Data Transport Over Dedicated Connections -- Trends and Future Directions of Research for Smart Grid IoT Sensor Networks -- SCADA: Analysis of Attacks on Communication Protocols -- Part IV: Bioinformatics -- TASB-AC: Term Annotated Sliding-window based Boosting Associative Classifier for DNA Repair Gene Categorization -- Temporal analysis of stress classification using QRS complex of ECG signals -- Conclusion.…”
Full-text access
View in OPAC
e-Book