Filter your results
- 491
- 417
- 73
- 1
- 491
- 39
- 291
- 50
- 32
- 22
- 5
- 42
- 62
- 43
- 39
- 28
- 44
- 34
- 35
- 35
- 40
- 53
- 31
- 491
- 5
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 10
- 7
- 7
- 6
- 5
- 5
- 5
- 5
- 4
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
|
Privacy-Preserving Scheduling Mechanism for eHealth Systems13th International Conference on Communications and Multimedia Security (CMS), Sep 2012, Canterbury, United Kingdom. pp.198-200, ⟨10.1007/978-3-642-32805-3_18⟩
Conference papers
hal-01540885v1
|
||
|
Designing Privacy-Enhancing Mobile Applications7th PrimeLife International Summer School (PRIMELIFE), Sep 2011, Trento, Italy. pp.157-170, ⟨10.1007/978-3-642-31668-5_12⟩
Conference papers
hal-01517593v1
|
||
|
A Game-Theoretic Formulation of Security Investment Decisions under Ex-ante Regulation27th Information Security and Privacy Conference (SEC), Jun 2012, Heraklion, Crete, Greece. pp.412-423, ⟨10.1007/978-3-642-30436-1_34⟩
Conference papers
hal-01518258v1
|
||
|
Ceremony Analysis: Strengths and Weaknesses26th International Information Security Conference (SEC), Jun 2011, Lucerne, Switzerland. pp.104-115, ⟨10.1007/978-3-642-21424-0_9⟩
Conference papers
hal-01567584v1
|
||
|
A Study on Abusing Superior Bargaining Position in the Anti-Monopoly Act and Its Relation to the Act on the Protection of Personal Information in Japan14th IFIP International Conference on Human Choice and Computers (HCC), Sep 2020, Tokyo, Japan. pp.5-15, ⟨10.1007/978-3-030-62803-1_1⟩
Conference papers
hal-03525270v1
|
||
|
Privacy by Design Principles in Design of New Generation Cognitive Assistive Technologies31st IFIP International Information Security and Privacy Conference (SEC), May 2016, Ghent, Belgium. pp.384-397, ⟨10.1007/978-3-319-33630-5_26⟩
Conference papers
hal-01369570v1
|
||
|
User Search with Knowledge Thresholds in Decentralized Online Social NetworksMarit Hansen; Jaap-Henk Hoepman; Ronald Leenes; Diane Whitehouse. Privacy and Identity Management for Emerging Services and Technologies : 8th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6 International Summer School, Nijmegen, The Netherlands, June 17-21, 2013, Revised Selected Papers, AICT-421, Springer, pp.188-202, 2014, IFIP Advances in Information and Communication Technology (TUTORIAL), 978-3-642-55136-9. ⟨10.1007/978-3-642-55137-6_15⟩
Book sections
hal-01276071v1
|
||
|
Flexible and Robust Privacy-Preserving Implicit Authentication30th IFIP International Information Security Conference (SEC), May 2015, Hamburg, Germany. pp.18-34, ⟨10.1007/978-3-319-18467-8_2⟩
Conference papers
hal-01345093v1
|
||
|
Learning Analytics and Privacy—Respecting Privacy in Digital Learning Scenarios15th IFIP International Summer School on Privacy and Identity Management (Privacy and Identity), Sep 2020, Maribor, Slovenia. pp.134-150, ⟨10.1007/978-3-030-72465-8_8⟩
Conference papers
hal-03703770v1
|
||
|
Predicting Selective Availability for Instant Messaging13th International Conference on Human-Computer Interaction (INTERACT), Sep 2011, Lisbon, Portugal. pp.503-520, ⟨10.1007/978-3-642-23765-2_35⟩
Conference papers
hal-01591801v1
|
||
|
N-Gram Based Secure Similar Document Detection23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.239-246, ⟨10.1007/978-3-642-22348-8_19⟩
Conference papers
hal-01586584v1
|
||
|
Health Care Reform and the Internet1st Availability, Reliability and Security (CD-ARES), Aug 2011, Vienna, Austria. pp.82-88, ⟨10.1007/978-3-642-23300-5_7⟩
Conference papers
hal-01590392v1
|
||
|
A Formal Framework for Consent Management40th International Conference on Formal Techniques for Distributed Objects, Components, and Systems (FORTE), Jun 2020, Valletta, Malta. pp.169-186, ⟨10.1007/978-3-030-50086-3_10⟩
Conference papers
hal-03283231v1
|
||
|
Are Video Resumes Preferred by Job Applicants? Information Technology in RecruitmentInternational Working Conference on Transfer and Diffusion of IT (TDIT), Dec 2020, Tiruchirappalli, India. pp.138-149, ⟨10.1007/978-3-030-64861-9_13⟩
Conference papers
hal-03744779v1
|
||
|
Privacy in Distributed Commercial Applications9th IFIP TC9 International Conference on Human Choice and Computers (HCC) / 1st IFIP TC11 International Conference on Critical Information Infrastructure Protection (CIP) / Held as Part of World Computer Congress (WCC), Sep 2010, Brisbane, Australia. pp.214-224, ⟨10.1007/978-3-642-15479-9_21⟩
Conference papers
hal-01058263v1
|
||
|
Language-Based Mechanisms for Privacy-by-Design14th IFIP International Summer School on Privacy and Identity Management (Privacy and Identity), Aug 2019, Windisch, Switzerland. pp.142-158, ⟨10.1007/978-3-030-42504-3_10⟩
Conference papers
hal-03378971v1
|
||
|
Research on Blockchain Privacy Protection Mechanism in Financial Transaction Services Based on Zero-Knowledge Proof and Federal Learning12th International Conference on Intelligent Information Processing (IIP), May 2022, Qingdao, China. pp.245-259, ⟨10.1007/978-3-031-03948-5_20⟩
Conference papers
hal-04178736v1
|
||
|
Hunting the Unknown28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.243-259, ⟨10.1007/978-3-662-43936-4_16⟩
Conference papers
hal-01284860v1
|
||
|
A Vulnerability in the Song Authentication Protocol for Low-Cost RFID Tags28th Security and Privacy Protection in Information Processing Systems (SEC), Jul 2013, Auckland, New Zealand. pp.102-110, ⟨10.1007/978-3-642-39218-4_8⟩
Conference papers
hal-01463848v1
|
||
|
Online Identity Theft on Consumer Purchase Intention: A Mediating Role of Online Security and Privacy Concern19th Conference on e-Business, e-Services and e-Society (I3E), Apr 2020, Skukuza, South Africa. pp.147-158, ⟨10.1007/978-3-030-45002-1_13⟩
Conference papers
hal-03774189v1
|
||
|
Glycos: The Basis for a Peer-to-Peer, Private Online Social NetworkEleni Kosta; Jo Pierson; Daniel Slamanig; Simone Fischer-Hübner; Stephan Krenn. Privacy and Identity Management. Fairness, Accountability, and Transparency in the Age of Big Data : 13th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Vienna, Austria, August 20-24, 2018, Revised Selected Papers, AICT-547, Springer International Publishing, pp.123-136, 2019, IFIP Advances in Information and Communication Technology, 978-3-030-16743-1. ⟨10.1007/978-3-030-16744-8_9⟩
Book sections
hal-02271660v1
|
||
|
GDPR Transparency Requirements and Data Privacy VocabulariesEleni Kosta; Jo Pierson; Daniel Slamanig; Simone Fischer-Hübner; Stephan Krenn. Privacy and Identity Management. Fairness, Accountability, and Transparency in the Age of Big Data : 13th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Vienna, Austria, August 20-24, 2018, Revised Selected Papers, AICT-547, Springer International Publishing, pp.95-113, 2019, IFIP Advances in Information and Communication Technology, 978-3-030-16743-1. ⟨10.1007/978-3-030-16744-8_7⟩
Book sections
hal-02271670v1
|
||
|
The Legitimacy of Cross-Border Searches Through the Internet for Criminal Investigations13th IFIP International Conference on Human Choice and Computers (HCC13), Sep 2018, Poznan, Poland. pp.329-337, ⟨10.1007/978-3-319-99605-9_25⟩
Conference papers
hal-02001953v1
|
||
|
Applications for In-Situ Feedback on Social Network Notifications17th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2019, Paphos, Cyprus. pp.626-629, ⟨10.1007/978-3-030-29390-1_50⟩
Conference papers
hal-02878646v1
|
||
|
emmy – Trust-Enhancing Authentication Library13th IFIP International Conference on Trust Management (IFIPTM), Jul 2019, Copenhagen, Denmark. pp.133-146, ⟨10.1007/978-3-030-33716-2_11⟩
Conference papers
hal-03182605v1
|
||
|
A Full Privacy-Preserving Scheme for Location-Based Services2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.596-601, ⟨10.1007/978-3-642-55032-4_61⟩
Conference papers
hal-01397275v1
|
||
|
Semantic-Aware Obfuscation for Location Privacy at Database Level1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.111-120, ⟨10.1007/978-3-642-36818-9_12⟩
Conference papers
hal-01480225v1
|
||
|
Data Protection by Default in Identity-Related Applications3rd Policies and Research in Identity Management (IDMAN), Apr 2013, London, United Kingdom. pp.4-17, ⟨10.1007/978-3-642-37282-7_2⟩
Conference papers
hal-01470500v1
|
||
|
Impact of User Data Privacy Management Controls on Mobile Device Investigations12th IFIP International Conference on Digital Forensics (DF), Jan 2016, New Delhi, India. pp.89-105, ⟨10.1007/978-3-319-46279-0_5⟩
Conference papers
hal-01758690v1
|
||
|
PrivacyTag: A Community-Based Method for Protecting Privacy of Photographed Subjects in Online Social Networks16th Conference on e-Business, e-Services and e-Society (I3E), Nov 2017, Delhi, India. pp.261-275, ⟨10.1007/978-3-319-68557-1_24⟩
Conference papers
hal-01768504v1
|