Search Results - "privacy"

Refine Results
  1. 1

    Privacy and publicity : modern architecture as mass media / by Colomina, Beatriz

    Published 1996
    View in OPAC
    Book
  2. 2

    Biometric Security and Privacy Opportunities & Challenges in The Big Data Era /

    Published 2017
    Table of Contents: “…-- A Survey on Soft Biometrics for Forensic Analysis -- Robust Biometric Verification with Low Quality Data -- Streamed Biometric Verification for Big Data Challenge -- Privacy-Protected Biometric Verification for Security Applications -- Part III - New Applications using Biometrics -- Biometric Key Generation using Fuzzy Extractor for Mobile Banking -- Securing Electronic Medical Records Using Biometric Authentication -- Body Biometrics from MRI Images for Medicine Advice -- Identify Invisible Persons inSocial Network -- From Memory to Human Recognition in Cognitive Robots.…”
    Full-text access
    View in OPAC
    e-Book
  3. 3

    Secrecy, Privacy and Accountability Challenges for Social Research / by Sheaff, Mike

    Published 2019
    Table of Contents: “…Trust, Transparency and Privacy. .…”
    Full-text access
    View in OPAC
    e-Book
  4. 4

    Situational Privacy and Self-Disclosure Communication Processes in Online Environments / by Masur, Philipp K.

    Published 2019
    Table of Contents: “…New Media Environments and Their Threats -- 3. Theories of Privacy -- 4. Theories of Self-Disclosure -- 5. Connecting Privacy and Self-Disclosure -- 6. …”
    Full-text access
    View in OPAC
    e-Book
  5. 5

    Drones and the law : international responses to rapid drone proliferation / by Sehrawat, Vivek

    Published 2020
    Table of Contents: “…Chapter 1: Historical Introduction and Technology Used in Drones -- Chapter 2: Legality of Drones Under LOAC and International Law -- Chapter 3: Legal Justifications for the Drone Targeted Killing -- Chapter 4: Point Forward: Legitimate Concerns about Drones' Proliferation -- Chapter 5: Drones Present and Future Privacy Laws: A Comparative Study of the U.S., U.K., and India.…”
    Full-text access
    View in OPAC
    e-Book
  6. 6

    On Privacy-Preserving Protocols for Smart Metering Systems Security and Privacy in Smart Grids / by Borges de Oliveira, Fábio

    Published 2017
    Table of Contents: “…Part I: Foundations -- Introduction -- Background and Models -- A Selective Review -- Part II: Contributions -- Reasons to Measure Frequently and Their Requirements -- Quantifying the Aggregation Size -- Selected Privacy-Preserving Protocols -- Analytical Comparison -- Simulation and Validation -- Concluding Remarks.…”
    Full-text access
    View in OPAC
    e-Book
  7. 7

    Smart Grids: Security and Privacy Issues by Boroojeni, Kianoosh G., Amini, M. Hadi, Iyengar, S. S.

    Published 2017
    Table of Contents: “…Overview of the Security and Privacy Issues in Smart Grids -- I Physical Network Security -- Reliability in Smart Grids -- Error Detection of DC Power Flow using State Estimation -- Bad Data Detection -- II Information Network Security -- Cloud Network Data Security -- III Privacy Preservation -- End-User Data Privacy -- Mobile User Data Privacy.…”
    Full-text access
    View in OPAC
    e-Book
  8. 8

    Compressed Sensing for Privacy-Preserving Data Processing by Testa, Matteo, Valsesia, Diego, Bianchi, Tiziano, Magli, Enrico

    Published 2019
    Table of Contents: “…Introduction -- Compressed Sensing and Security -- Compressed Sensing as a Cryptosystem -- Privacy-preserving Embeddings -- Conclusion.…”
    Full-text access
    View in OPAC
    e-Book
  9. 9

    Big Data Privacy Preservation for Cyber-Physical Systems by Pan, Miao, Wang, Jingyi, Errapotu, Sai Mounika, Zhang, Xinyue, Ding, Jiahao, Han, Zhu

    Published 2019
    Table of Contents: “…Chapter 1 Cyber-Physical Systems -- Chapter 2 Preliminaries -- Chapter 3 Spectrum Trading with Secondary Users' Privacy Protection -- Chapter 4 Optimization for Utility Providers with Privacy Preservation of Users' Energy Profile -- Chapter 5 Caching with Users' Differential Privacy Preservation in Information-Centric Networks -- Chapter 6 Clock Auction Inspired Privacy Preservation in Colocation Data Centers.…”
    Full-text access
    View in OPAC
    e-Book
  10. 10

    Secure and Privacy-Preserving Data Communication in Internet of Things by Zhu, Liehuang, Zhang, Zijian, Xu, Chang

    Published 2017
    Table of Contents: “…Introduction -- Secure Data Aggregation in Wireless Sensor Network -- Privacy preserving Meter Reading Transmission in Smart Grid -- Key Agreement and Management in Vehicular Ad-hoc Network -- Conclusion.…”
    Full-text access
    View in OPAC
    e-Book
  11. 11

    Data Privacy: Foundations, New Developments and the Big Data Challenge by Torra, Vicenç

    Published 2017
    Table of Contents: “…Introduction -- Machine and Statistical Learning -- On the Classification of Protection Procedures -- User's privacy -- Privacy Models and Disclosure Risk Measures -- Masking methods -- Information loss: evaluation and measures -- Selection of masking methods -- Conclusions.…”
    Full-text access
    View in OPAC
    e-Book
  12. 12

    Uygarlaşma sürecinin miti 2 : mahremiyet / by Duerr, Hans Peter

    Published 2004
    Subjects:
    View in OPAC
    Book
  13. 13

    Uygarlaşma sürecinin miti 1 : çıplaklık ve utanç/ by Duerr, Hans Peter

    Published 1999
    Subjects:
    View in OPAC
    Book
  14. 14

    Women Securing the Future with TIPPSS for IoT Trust, Identity, Privacy, Protection, Safety, Security for the Internet of Things /

    Published 2019
    Table of Contents: “…Introduction -- End to end trust and security for the Internet of Things -- Wise Information Security across the globe -- Secure hardware technology for IoT -- Defense in depth strategies to secure IoT devices -- Safety and security of Cyber Physical Systems -- Securing the endpoints in a connected world -- Securing healthcare devices - The Internet of Biomedical Things -- Protection of the elderly - Elder care robot TIPPSS for IoT -- Process and culture opportunities to address cybersecurity challenges -- Developing the ecosystem for TIPPSS for IoT -- Trust and Identify solutions for IoT -- Privacy and policy implications for IoT -- Blockchain potential to enable TIPPSS for IoT -- Conclusion.…”
    Full-text access
    View in OPAC
    e-Book
  15. 15

    Dünü ve bugünüyle İslâm’da mahremiyet/ by Martı, Huriye

    Published 2022
    Subjects:
    View in OPAC
    Book
  16. 16

    The Swedish microchipping phenomenon / by Petersén, Moa

    Published 2019
    Subjects:
    Full-text access
    View in OPAC
    e-Book
  17. 17

    Mobile interfaces in public spaces/ by Silva, Adriana de Souza e

    Published 2012
    Subjects:
    View in OPAC
    Book
  18. 18

    Mahremiyetin tahribi / by Arslan, Çetin.

    Published 2020
    Subjects:
    View in OPAC
    Book
  19. 19

    Internet of Things Security and Data Protection

    Published 2019
    Table of Contents: “…Internet of Things Cybersecurity Paradigm Shift, Threats Matrix and Practical Taxonomy -- Chapter 2. Privacy and Security Threats on the Internet of Things -- Chapter 3. …”
    Full-text access
    View in OPAC
    e-Book
  20. 20

    Proceedings of International Symposium on Sensor Networks, Systems and Security Advances in Computing and Networking with Applications /

    Published 2018
    Table of Contents: “…Introduction -- Part I: Privacy and game theory -- A Novel Perfect Privacy PIR scheme for Privacy Critical Applications -- Heterogeneous Sensor Privacy Protection with Stackelberg Privacy Games -- Intelligent Access Control: A Self-Adaptable Trust Based Access Control Framework (SATBAC) using Game Theory Strategy -- Public Key Cryptosystem for Privacy Sensitive Location Based Services -- Stochastic Tools for Network Intrusion Detection -- Part II: High performance computing and the cloud -- Accelerating the Big Data Analytics by GPU based Machine Learning: A Survey -- Multimedia Data Management for Disaster Situation Awareness -- On the Need of Security Standards in Big Data Information Flow -- Using Markov models and statistics to learn, extract, fuse, and detect patterns in raw data -- Dynamic Firewall Policy Management Framework for Private Cloud -- Security threats and solutions for virtualization and migration in virtual machines -- Techniques to certify integrity and proof of existence for a periodical re-encryption based long term archival systems -- Part III: Networking and the Internet of Things (IoT) -- A Study of Contact Durations for Vehicle to Vehicle Communications -- Evolution of Sensors leading to Smart Objects and Security Issues in IoT -- Flexible Bandwidth Scheduling for Streaming Data Movement Over Dedicated Networks -- Internet of Things: Current Trends and Emerging Prospects -- Measurements and Analytics of Data Transport Over Dedicated Connections -- Trends and Future Directions of Research for Smart Grid IoT Sensor Networks -- SCADA: Analysis of Attacks on Communication Protocols -- Part IV: Bioinformatics -- TASB-AC: Term Annotated Sliding-window based Boosting Associative Classifier for DNA Repair Gene Categorization -- Temporal analysis of stress classification using QRS complex of ECG signals -- Conclusion.…”
    Full-text access
    View in OPAC
    e-Book