Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

182 results
Keywords : Privacy and personal data
Image document

Counteracting Active Attacks in Social Network Graphs

Sjouke Mauw , Rolando Trujillo-Rasua , Bochuan Xuan
30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.233-248, ⟨10.1007/978-3-319-41483-6_17⟩
Conference papers hal-01633668v1
Image document

Privacy-Respecting Auctions as Incentive Mechanisms in Mobile Crowd Sensing

Tassos Dimitriou , Ioannis Krontiris
9th Workshop on Information Security Theory and Practice (WISTP), Aug 2015, Heraklion, Crete, Greece. pp.20-35, ⟨10.1007/978-3-319-24018-3_2⟩
Conference papers hal-01442551v1
Image document

Multi-party Private Set Operations with an External Decider

Sara Ramezanian , Tommi Meskanen , Valtteri Niemi
35th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2021, Calgary, AB, Canada. pp.117-135, ⟨10.1007/978-3-030-81242-3_7⟩
Conference papers hal-03677026v1
Image document

Hiding Information in Social Networks from De-anonymization Attacks by Using Identity Separation

Gábor György Gulyás , Sándor Imre
14th International Conference on Communications and Multimedia Security (CMS), Sep 2013, Magdeburg,, Germany. pp.173-184, ⟨10.1007/978-3-642-40779-6_15⟩
Conference papers hal-01492819v1
Image document

A Peer-to-Peer Protocol and System Architecture for Privacy-Preserving Statistical Analysis

Katerina Zamani , Angelos Charalambidis , Stasinos Konstantopoulos , Maria Dagioglou , Vangelis Karkaletsis
International Conference on Availability, Reliability, and Security (CD-ARES), Aug 2016, Salzburg, Austria. pp.236-250, ⟨10.1007/978-3-319-45507-5_16⟩
Conference papers hal-01635009v1
Image document

Privacy-Preserving Data Allocation in Decentralized Online Social Networks

Andrea de Salve , Paolo Mori , Laura Ricci , Raed Al-Aaridhi , Kalman Graffi
16th IFIP WG 6.1 International Conference on Distributed Applications and Interoperable Systems (DAIS), Jun 2016, Heraklion, Crete, Greece. pp.47-60, ⟨10.1007/978-3-319-39577-7_4⟩
Conference papers hal-01434799v1
Image document

Data Privacy Perceptions About Digital Forensic Investigations in India

Robin Verma , Jayaprakash Govindaraj , Gaurav Gupta
12th IFIP International Conference on Digital Forensics (DF), Jan 2016, New Delhi, India. pp.25-45, ⟨10.1007/978-3-319-46279-0_2⟩
Conference papers hal-01758694v1
Image document

On the Ethics of Using Publicly-Available Data

Antony K. Cooper , Serena Coetzee
19th Conference on e-Business, e-Services and e-Society (I3E), Apr 2020, Skukuza, South Africa. pp.159-171, ⟨10.1007/978-3-030-45002-1_14⟩
Conference papers hal-03774195v1
Image document

Enhanced Privacy Protection in Blockchain Using SGX and Sidechains

M. Mohideen Abdulkader , S. Ganesh Kumar
4th International Conference on Computational Intelligence in Data Science (ICCIDS), Mar 2021, Chennai, India. pp.200-209, ⟨10.1007/978-3-030-92600-7_19⟩
Conference papers hal-03772926v1
Image document

Commercial Home Assistance (eHealth) Services

Milica Milutinovic , Koen Decroix , Vincent Naessens , Bart De Decker
International Workshop on Open Problems in Network Security (iNetSec), Jun 2011, Lucerne, Switzerland. pp.28-42, ⟨10.1007/978-3-642-27585-2_3⟩
Conference papers hal-01481504v1
Image document

Analysis of Revocation Strategies for Anonymous Idemix Credentials

Jorn Lapon , Markulf Kohlweiss , Bart De Decker , Vincent Naessens
12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.3-17, ⟨10.1007/978-3-642-24712-5_1⟩
Conference papers hal-01596188v1
Image document

A Forward Privacy Model for RFID Authentication Protocols

Daisuke Moriyama , Miyako Ohkubo , Shin’ichiro Matsuo
7th International Workshop on Information Security THeory and Practice (WISTP), May 2013, Heraklion, Greece. pp.98-111, ⟨10.1007/978-3-642-38530-8_7⟩
Conference papers hal-01485936v1
Image document

k-Anonymity-Based Horizontal Fragmentation to Preserve Privacy in Data Outsourcing

Abbas Taheri Soodejani , Mohammad Ali Hadavi , Rasool Jalili
26th Conference on Data and Applications Security and Privacy (DBSec), Jul 2012, Paris, France. pp.263-273, ⟨10.1007/978-3-642-31540-4_20⟩
Conference papers hal-01534772v1
Image document

Communicating Privacy: User Priorities for Privacy Requirements in Home Energy Applications

Lisa Diamond , Peter Fröhlich
18th IFIP Conference on Human-Computer Interaction (INTERACT), Aug 2021, Bari, Italy. pp.665-675, ⟨10.1007/978-3-030-85610-6_38⟩
Conference papers hal-04215509v1
Image document

Geo-Graph-Indistinguishability: Protecting Location Privacy for LBS over Road Networks

Shun Takagi , Yang Cao , Yasuhito Asano , Masatoshi Yoshikawa
33th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2019, Charleston, SC, United States. pp.143-163, ⟨10.1007/978-3-030-22479-0_8⟩
Conference papers hal-02384594v1
Image document

Image Pixelization with Differential Privacy

Liyue Fan
32th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2018, Bergamo, Italy. pp.148-162, ⟨10.1007/978-3-319-95729-6_10⟩
Conference papers hal-01954420v1
Image document

Pervasive Gaming as a Potential Solution to Traffic Congestion: New Challenges Regarding Ethics, Privacy and Trust

Vincent Koenig , Franziska Boehm , Rod Mccall
11th International Confernece on Entertainment Computing (ICEC), Sep 2012, Bremen, Germany. pp.586-593, ⟨10.1007/978-3-642-33542-6_78⟩
Conference papers hal-01556169v1
Image document

Differentially Private Obfuscation of Facial Images

William L. Croft , Jörg-Rüdiger Sack , Wei Shi
3rd International Cross-Domain Conference for Machine Learning and Knowledge Extraction (CD-MAKE), Aug 2019, Canterbury, United Kingdom. pp.229-249, ⟨10.1007/978-3-030-29726-8_15⟩
Conference papers hal-02520056v1
Image document

Towards a Context-Aware Security and Privacy as a Service in the Internet of Things

Tidiane Sylla , Mohamed Aymen Chalouf , Francine Krief , Karim Samaké
13th IFIP International Conference on Information Security Theory and Practice (WISTP), Dec 2019, Paris, France. pp.240-252, ⟨10.1007/978-3-030-41702-4_15⟩
Conference papers hal-02496273v1
Image document

FOUGERE: User-Centric Location Privacy in Mobile Crowdsourcing Apps

Lakhdar Meftah , Romain Rouvoy , Isabelle Chrisment
DAIS 2019 - 19th IFIP International Conference on Distributed Applications and Interoperable Systems, Jun 2019, Kongens Lyngby, Denmark. pp.116-132, ⟨10.1007/978-3-030-22496-7_8⟩
Conference papers hal-02121311v1
Image document

Privacy Respecting Targeted Advertising for Social Networks

Christian Kahl , Stephen Crane , Markus Tschersich , Kai Rannenberg
5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.361-370, ⟨10.1007/978-3-642-21040-2_26⟩
Conference papers hal-01573299v1
Image document

Privacy-Preserving Scheduling Mechanism for eHealth Systems

Milica Milutinovic , Vincent Naessens , Bart De Decker
13th International Conference on Communications and Multimedia Security (CMS), Sep 2012, Canterbury, United Kingdom. pp.198-200, ⟨10.1007/978-3-642-32805-3_18⟩
Conference papers hal-01540885v1
Image document

Predicting Selective Availability for Instant Messaging

Mirko Fetter , Julian Seifert , Tom Gross
13th International Conference on Human-Computer Interaction (INTERACT), Sep 2011, Lisbon, Portugal. pp.503-520, ⟨10.1007/978-3-642-23765-2_35⟩
Conference papers hal-01591801v1
Image document

N-Gram Based Secure Similar Document Detection

Wei Jiang , Bharath K. Samanthula
23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.239-246, ⟨10.1007/978-3-642-22348-8_19⟩
Conference papers hal-01586584v1
Image document

Health Care Reform and the Internet

Patricia Mactaggart , Stephanie Fiore
1st Availability, Reliability and Security (CD-ARES), Aug 2011, Vienna, Austria. pp.82-88, ⟨10.1007/978-3-642-23300-5_7⟩
Conference papers hal-01590392v1
Image document

A Formal Framework for Consent Management

Shukun Tokas , Olaf Owe
40th International Conference on Formal Techniques for Distributed Objects, Components, and Systems (FORTE), Jun 2020, Valletta, Malta. pp.169-186, ⟨10.1007/978-3-030-50086-3_10⟩
Conference papers hal-03283231v1
Image document

Hunting the Unknown

Elisa Costante , Jerry Den Hartog , Milan Petković , Sandro Etalle , Mykola Pechenizkiy
28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.243-259, ⟨10.1007/978-3-662-43936-4_16⟩
Conference papers hal-01284860v1
Image document

Online Identity Theft on Consumer Purchase Intention: A Mediating Role of Online Security and Privacy Concern

Abdul Bashiru Jibril , Michael Adu Kwarteng , Fortune Nwaiwu , Christina Appiah-Nimo , Michal Pilik , et al.
19th Conference on e-Business, e-Services and e-Society (I3E), Apr 2020, Skukuza, South Africa. pp.147-158, ⟨10.1007/978-3-030-45002-1_13⟩
Conference papers hal-03774189v1
Image document

Applications for In-Situ Feedback on Social Network Notifications

Frederic Raber , Antonio Krüger
17th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2019, Paphos, Cyprus. pp.626-629, ⟨10.1007/978-3-030-29390-1_50⟩
Conference papers hal-02878646v1
Image document

A Full Privacy-Preserving Scheme for Location-Based Services

Fei Shao , Rong Cheng , Fangguo Zhang
2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.596-601, ⟨10.1007/978-3-642-55032-4_61⟩
Conference papers hal-01397275v1