Filter your results
- 182
- 181
- 1
- 182
- 29
- 93
- 22
- 20
- 13
- 13
- 12
- 14
- 12
- 13
- 18
- 21
- 17
- 26
- 3
- 182
- 4
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
Counteracting Active Attacks in Social Network Graphs30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.233-248, ⟨10.1007/978-3-319-41483-6_17⟩
Conference papers
hal-01633668v1
|
||
|
Privacy-Respecting Auctions as Incentive Mechanisms in Mobile Crowd Sensing9th Workshop on Information Security Theory and Practice (WISTP), Aug 2015, Heraklion, Crete, Greece. pp.20-35, ⟨10.1007/978-3-319-24018-3_2⟩
Conference papers
hal-01442551v1
|
||
|
Multi-party Private Set Operations with an External Decider35th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2021, Calgary, AB, Canada. pp.117-135, ⟨10.1007/978-3-030-81242-3_7⟩
Conference papers
hal-03677026v1
|
||
|
Hiding Information in Social Networks from De-anonymization Attacks by Using Identity Separation14th International Conference on Communications and Multimedia Security (CMS), Sep 2013, Magdeburg,, Germany. pp.173-184, ⟨10.1007/978-3-642-40779-6_15⟩
Conference papers
hal-01492819v1
|
||
|
A Peer-to-Peer Protocol and System Architecture for Privacy-Preserving Statistical AnalysisInternational Conference on Availability, Reliability, and Security (CD-ARES), Aug 2016, Salzburg, Austria. pp.236-250, ⟨10.1007/978-3-319-45507-5_16⟩
Conference papers
hal-01635009v1
|
||
|
Privacy-Preserving Data Allocation in Decentralized Online Social Networks16th IFIP WG 6.1 International Conference on Distributed Applications and Interoperable Systems (DAIS), Jun 2016, Heraklion, Crete, Greece. pp.47-60, ⟨10.1007/978-3-319-39577-7_4⟩
Conference papers
hal-01434799v1
|
||
|
Data Privacy Perceptions About Digital Forensic Investigations in India12th IFIP International Conference on Digital Forensics (DF), Jan 2016, New Delhi, India. pp.25-45, ⟨10.1007/978-3-319-46279-0_2⟩
Conference papers
hal-01758694v1
|
||
|
On the Ethics of Using Publicly-Available Data19th Conference on e-Business, e-Services and e-Society (I3E), Apr 2020, Skukuza, South Africa. pp.159-171, ⟨10.1007/978-3-030-45002-1_14⟩
Conference papers
hal-03774195v1
|
||
|
Enhanced Privacy Protection in Blockchain Using SGX and Sidechains4th International Conference on Computational Intelligence in Data Science (ICCIDS), Mar 2021, Chennai, India. pp.200-209, ⟨10.1007/978-3-030-92600-7_19⟩
Conference papers
hal-03772926v1
|
||
|
Commercial Home Assistance (eHealth) ServicesInternational Workshop on Open Problems in Network Security (iNetSec), Jun 2011, Lucerne, Switzerland. pp.28-42, ⟨10.1007/978-3-642-27585-2_3⟩
Conference papers
hal-01481504v1
|
||
|
Analysis of Revocation Strategies for Anonymous Idemix Credentials12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.3-17, ⟨10.1007/978-3-642-24712-5_1⟩
Conference papers
hal-01596188v1
|
||
|
A Forward Privacy Model for RFID Authentication Protocols7th International Workshop on Information Security THeory and Practice (WISTP), May 2013, Heraklion, Greece. pp.98-111, ⟨10.1007/978-3-642-38530-8_7⟩
Conference papers
hal-01485936v1
|
||
|
k-Anonymity-Based Horizontal Fragmentation to Preserve Privacy in Data Outsourcing26th Conference on Data and Applications Security and Privacy (DBSec), Jul 2012, Paris, France. pp.263-273, ⟨10.1007/978-3-642-31540-4_20⟩
Conference papers
hal-01534772v1
|
||
|
Communicating Privacy: User Priorities for Privacy Requirements in Home Energy Applications18th IFIP Conference on Human-Computer Interaction (INTERACT), Aug 2021, Bari, Italy. pp.665-675, ⟨10.1007/978-3-030-85610-6_38⟩
Conference papers
hal-04215509v1
|
||
|
Geo-Graph-Indistinguishability: Protecting Location Privacy for LBS over Road Networks33th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2019, Charleston, SC, United States. pp.143-163, ⟨10.1007/978-3-030-22479-0_8⟩
Conference papers
hal-02384594v1
|
||
|
Image Pixelization with Differential Privacy32th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2018, Bergamo, Italy. pp.148-162, ⟨10.1007/978-3-319-95729-6_10⟩
Conference papers
hal-01954420v1
|
||
|
Pervasive Gaming as a Potential Solution to Traffic Congestion: New Challenges Regarding Ethics, Privacy and Trust11th International Confernece on Entertainment Computing (ICEC), Sep 2012, Bremen, Germany. pp.586-593, ⟨10.1007/978-3-642-33542-6_78⟩
Conference papers
hal-01556169v1
|
||
|
Differentially Private Obfuscation of Facial Images3rd International Cross-Domain Conference for Machine Learning and Knowledge Extraction (CD-MAKE), Aug 2019, Canterbury, United Kingdom. pp.229-249, ⟨10.1007/978-3-030-29726-8_15⟩
Conference papers
hal-02520056v1
|
||
|
Towards a Context-Aware Security and Privacy as a Service in the Internet of Things13th IFIP International Conference on Information Security Theory and Practice (WISTP), Dec 2019, Paris, France. pp.240-252, ⟨10.1007/978-3-030-41702-4_15⟩
Conference papers
hal-02496273v1
|
||
|
FOUGERE: User-Centric Location Privacy in Mobile Crowdsourcing AppsDAIS 2019 - 19th IFIP International Conference on Distributed Applications and Interoperable Systems, Jun 2019, Kongens Lyngby, Denmark. pp.116-132, ⟨10.1007/978-3-030-22496-7_8⟩
Conference papers
hal-02121311v1
|
||
|
Privacy Respecting Targeted Advertising for Social Networks5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.361-370, ⟨10.1007/978-3-642-21040-2_26⟩
Conference papers
hal-01573299v1
|
||
|
Privacy-Preserving Scheduling Mechanism for eHealth Systems13th International Conference on Communications and Multimedia Security (CMS), Sep 2012, Canterbury, United Kingdom. pp.198-200, ⟨10.1007/978-3-642-32805-3_18⟩
Conference papers
hal-01540885v1
|
||
|
Predicting Selective Availability for Instant Messaging13th International Conference on Human-Computer Interaction (INTERACT), Sep 2011, Lisbon, Portugal. pp.503-520, ⟨10.1007/978-3-642-23765-2_35⟩
Conference papers
hal-01591801v1
|
||
|
N-Gram Based Secure Similar Document Detection23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.239-246, ⟨10.1007/978-3-642-22348-8_19⟩
Conference papers
hal-01586584v1
|
||
|
Health Care Reform and the Internet1st Availability, Reliability and Security (CD-ARES), Aug 2011, Vienna, Austria. pp.82-88, ⟨10.1007/978-3-642-23300-5_7⟩
Conference papers
hal-01590392v1
|
||
|
A Formal Framework for Consent Management40th International Conference on Formal Techniques for Distributed Objects, Components, and Systems (FORTE), Jun 2020, Valletta, Malta. pp.169-186, ⟨10.1007/978-3-030-50086-3_10⟩
Conference papers
hal-03283231v1
|
||
|
Hunting the Unknown28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.243-259, ⟨10.1007/978-3-662-43936-4_16⟩
Conference papers
hal-01284860v1
|
||
|
Online Identity Theft on Consumer Purchase Intention: A Mediating Role of Online Security and Privacy Concern19th Conference on e-Business, e-Services and e-Society (I3E), Apr 2020, Skukuza, South Africa. pp.147-158, ⟨10.1007/978-3-030-45002-1_13⟩
Conference papers
hal-03774189v1
|
||
|
Applications for In-Situ Feedback on Social Network Notifications17th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2019, Paphos, Cyprus. pp.626-629, ⟨10.1007/978-3-030-29390-1_50⟩
Conference papers
hal-02878646v1
|
||
|
A Full Privacy-Preserving Scheme for Location-Based Services2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.596-601, ⟨10.1007/978-3-642-55032-4_61⟩
Conference papers
hal-01397275v1
|