Search - IFIP Open Digital Library Access content directly

Filter your results

491 results
level0_domain_s : Computer Science [cs]
Keywords : Privacy
Image document

Privacy-Preserving Scheduling Mechanism for eHealth Systems

Milica Milutinovic , Vincent Naessens , Bart De Decker
13th International Conference on Communications and Multimedia Security (CMS), Sep 2012, Canterbury, United Kingdom. pp.198-200, ⟨10.1007/978-3-642-32805-3_18⟩
Conference papers hal-01540885v1
Image document

Designing Privacy-Enhancing Mobile Applications

Koen Decroix , Bart De Decker , Vincent Naessens
7th PrimeLife International Summer School (PRIMELIFE), Sep 2011, Trento, Italy. pp.157-170, ⟨10.1007/978-3-642-31668-5_12⟩
Conference papers hal-01517593v1
Image document

A Game-Theoretic Formulation of Security Investment Decisions under Ex-ante Regulation

Giuseppe D’acquisto , Marta Flamini , Maurizio Naldi
27th Information Security and Privacy Conference (SEC), Jun 2012, Heraklion, Crete, Greece. pp.412-423, ⟨10.1007/978-3-642-30436-1_34⟩
Conference papers hal-01518258v1
Image document

Ceremony Analysis: Strengths and Weaknesses

Kenneth Radke , Colin Boyd , Juan Gonzalez Nieto , Margot Brereton
26th International Information Security Conference (SEC), Jun 2011, Lucerne, Switzerland. pp.104-115, ⟨10.1007/978-3-642-21424-0_9⟩
Conference papers hal-01567584v1
Image document

A Study on Abusing Superior Bargaining Position in the Anti-Monopoly Act and Its Relation to the Act on the Protection of Personal Information in Japan

Kaori Ishii
14th IFIP International Conference on Human Choice and Computers (HCC), Sep 2020, Tokyo, Japan. pp.5-15, ⟨10.1007/978-3-030-62803-1_1⟩
Conference papers hal-03525270v1
Image document

Privacy by Design Principles in Design of New Generation Cognitive Assistive Technologies

Ella Kolkowska , Annica Kristofferson
31st IFIP International Information Security and Privacy Conference (SEC), May 2016, Ghent, Belgium. pp.384-397, ⟨10.1007/978-3-319-33630-5_26⟩
Conference papers hal-01369570v1
Image document

User Search with Knowledge Thresholds in Decentralized Online Social Networks

Benjamin Greschbach , Gunnar Kreitz , Sonja Buchegger
Marit Hansen; Jaap-Henk Hoepman; Ronald Leenes; Diane Whitehouse. Privacy and Identity Management for Emerging Services and Technologies : 8th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6 International Summer School, Nijmegen, The Netherlands, June 17-21, 2013, Revised Selected Papers, AICT-421, Springer, pp.188-202, 2014, IFIP Advances in Information and Communication Technology (TUTORIAL), 978-3-642-55136-9. ⟨10.1007/978-3-642-55137-6_15⟩
Book sections hal-01276071v1
Image document

Flexible and Robust Privacy-Preserving Implicit Authentication

Josep Domingo-Ferrer , Qianhong Wu , Alberto Blanco-Justicia
30th IFIP International Information Security Conference (SEC), May 2015, Hamburg, Germany. pp.18-34, ⟨10.1007/978-3-319-18467-8_2⟩
Conference papers hal-01345093v1
Image document

Learning Analytics and Privacy—Respecting Privacy in Digital Learning Scenarios

Marvin Priedigkeit , Andreas Weich , Ina Schiering
15th IFIP International Summer School on Privacy and Identity Management (Privacy and Identity), Sep 2020, Maribor, Slovenia. pp.134-150, ⟨10.1007/978-3-030-72465-8_8⟩
Conference papers hal-03703770v1
Image document

Predicting Selective Availability for Instant Messaging

Mirko Fetter , Julian Seifert , Tom Gross
13th International Conference on Human-Computer Interaction (INTERACT), Sep 2011, Lisbon, Portugal. pp.503-520, ⟨10.1007/978-3-642-23765-2_35⟩
Conference papers hal-01591801v1
Image document

N-Gram Based Secure Similar Document Detection

Wei Jiang , Bharath K. Samanthula
23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.239-246, ⟨10.1007/978-3-642-22348-8_19⟩
Conference papers hal-01586584v1
Image document

Health Care Reform and the Internet

Patricia Mactaggart , Stephanie Fiore
1st Availability, Reliability and Security (CD-ARES), Aug 2011, Vienna, Austria. pp.82-88, ⟨10.1007/978-3-642-23300-5_7⟩
Conference papers hal-01590392v1
Image document

A Formal Framework for Consent Management

Shukun Tokas , Olaf Owe
40th International Conference on Formal Techniques for Distributed Objects, Components, and Systems (FORTE), Jun 2020, Valletta, Malta. pp.169-186, ⟨10.1007/978-3-030-50086-3_10⟩
Conference papers hal-03283231v1
Image document

Are Video Resumes Preferred by Job Applicants? Information Technology in Recruitment

Apoorva Goel , Richa Awasthy
International Working Conference on Transfer and Diffusion of IT (TDIT), Dec 2020, Tiruchirappalli, India. pp.138-149, ⟨10.1007/978-3-030-64861-9_13⟩
Conference papers hal-03744779v1
Image document

Privacy in Distributed Commercial Applications

Nicolai Kuntze , Carsten Rudolph
9th IFIP TC9 International Conference on Human Choice and Computers (HCC) / 1st IFIP TC11 International Conference on Critical Information Infrastructure Protection (CIP) / Held as Part of World Computer Congress (WCC), Sep 2010, Brisbane, Australia. pp.214-224, ⟨10.1007/978-3-642-15479-9_21⟩
Conference papers hal-01058263v1
Image document

Language-Based Mechanisms for Privacy-by-Design

Shukun Tokas , Olaf Owe , Toktam Ramezanifarkhani
14th IFIP International Summer School on Privacy and Identity Management (Privacy and Identity), Aug 2019, Windisch, Switzerland. pp.142-158, ⟨10.1007/978-3-030-42504-3_10⟩
Conference papers hal-03378971v1
Image document

Research on Blockchain Privacy Protection Mechanism in Financial Transaction Services Based on Zero-Knowledge Proof and Federal Learning

Maoguang Wang , Tianming Wang , Haoyue Ji
12th International Conference on Intelligent Information Processing (IIP), May 2022, Qingdao, China. pp.245-259, ⟨10.1007/978-3-031-03948-5_20⟩
Conference papers hal-04178736v1
Image document

Hunting the Unknown

Elisa Costante , Jerry Den Hartog , Milan Petković , Sandro Etalle , Mykola Pechenizkiy
28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.243-259, ⟨10.1007/978-3-662-43936-4_16⟩
Conference papers hal-01284860v1
Image document

A Vulnerability in the Song Authentication Protocol for Low-Cost RFID Tags

Sarah Abughazalah , Konstantinos Markantonakis , Keith Mayes
28th Security and Privacy Protection in Information Processing Systems (SEC), Jul 2013, Auckland, New Zealand. pp.102-110, ⟨10.1007/978-3-642-39218-4_8⟩
Conference papers hal-01463848v1
Image document

Online Identity Theft on Consumer Purchase Intention: A Mediating Role of Online Security and Privacy Concern

Abdul Bashiru Jibril , Michael Adu Kwarteng , Fortune Nwaiwu , Christina Appiah-Nimo , Michal Pilik , et al.
19th Conference on e-Business, e-Services and e-Society (I3E), Apr 2020, Skukuza, South Africa. pp.147-158, ⟨10.1007/978-3-030-45002-1_13⟩
Conference papers hal-03774189v1
Image document

Glycos: The Basis for a Peer-to-Peer, Private Online Social Network

Ruben de Smet , Ann Dooms , An Braeken , Jo Pierson
Eleni Kosta; Jo Pierson; Daniel Slamanig; Simone Fischer-Hübner; Stephan Krenn. Privacy and Identity Management. Fairness, Accountability, and Transparency in the Age of Big Data : 13th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Vienna, Austria, August 20-24, 2018, Revised Selected Papers, AICT-547, Springer International Publishing, pp.123-136, 2019, IFIP Advances in Information and Communication Technology, 978-3-030-16743-1. ⟨10.1007/978-3-030-16744-8_9⟩
Book sections hal-02271660v1
Image document

GDPR Transparency Requirements and Data Privacy Vocabularies

Eva Schlehahn , Rigo Wenning
Eleni Kosta; Jo Pierson; Daniel Slamanig; Simone Fischer-Hübner; Stephan Krenn. Privacy and Identity Management. Fairness, Accountability, and Transparency in the Age of Big Data : 13th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Vienna, Austria, August 20-24, 2018, Revised Selected Papers, AICT-547, Springer International Publishing, pp.95-113, 2019, IFIP Advances in Information and Communication Technology, 978-3-030-16743-1. ⟨10.1007/978-3-030-16744-8_7⟩
Book sections hal-02271670v1
Image document

The Legitimacy of Cross-Border Searches Through the Internet for Criminal Investigations

Taro Komukai , Aimi Ozaki
13th IFIP International Conference on Human Choice and Computers (HCC13), Sep 2018, Poznan, Poland. pp.329-337, ⟨10.1007/978-3-319-99605-9_25⟩
Conference papers hal-02001953v1
Image document

Applications for In-Situ Feedback on Social Network Notifications

Frederic Raber , Antonio Krüger
17th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2019, Paphos, Cyprus. pp.626-629, ⟨10.1007/978-3-030-29390-1_50⟩
Conference papers hal-02878646v1
Image document

emmy – Trust-Enhancing Authentication Library

Miha Stopar , Manca Bizjak , Jolanda Modic , Jan Hartman , Anže Žitnik , et al.
13th IFIP International Conference on Trust Management (IFIPTM), Jul 2019, Copenhagen, Denmark. pp.133-146, ⟨10.1007/978-3-030-33716-2_11⟩
Conference papers hal-03182605v1
Image document

A Full Privacy-Preserving Scheme for Location-Based Services

Fei Shao , Rong Cheng , Fangguo Zhang
2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.596-601, ⟨10.1007/978-3-642-55032-4_61⟩
Conference papers hal-01397275v1
Image document

Semantic-Aware Obfuscation for Location Privacy at Database Level

Thu Bao Le , Tran Khanh Dang
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.111-120, ⟨10.1007/978-3-642-36818-9_12⟩
Conference papers hal-01480225v1
Image document

Data Protection by Default in Identity-Related Applications

Marit Hansen
3rd Policies and Research in Identity Management (IDMAN), Apr 2013, London, United Kingdom. pp.4-17, ⟨10.1007/978-3-642-37282-7_2⟩
Conference papers hal-01470500v1
Image document

Impact of User Data Privacy Management Controls on Mobile Device Investigations

Panagiotis Andriotis , Theo Tryfonas
12th IFIP International Conference on Digital Forensics (DF), Jan 2016, New Delhi, India. pp.89-105, ⟨10.1007/978-3-319-46279-0_5⟩
Conference papers hal-01758690v1
Image document

PrivacyTag: A Community-Based Method for Protecting Privacy of Photographed Subjects in Online Social Networks

Shimon Machida , Adrian Dabrowski , Edgar Weippl , Isao Echizen
16th Conference on e-Business, e-Services and e-Society (I3E), Nov 2017, Delhi, India. pp.261-275, ⟨10.1007/978-3-319-68557-1_24⟩
Conference papers hal-01768504v1