Filter your results
- 38
- 38
- 38
- 38
- 20
- 1
- 4
- 3
- 3
- 5
- 3
- 5
- 9
- 1
- 4
- 38
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
A Peer-to-Peer Protocol and System Architecture for Privacy-Preserving Statistical AnalysisInternational Conference on Availability, Reliability, and Security (CD-ARES), Aug 2016, Salzburg, Austria. pp.236-250, ⟨10.1007/978-3-319-45507-5_16⟩
Conference papers
hal-01635009v1
|
||
|
The Privacy Paradox of Utilizing the Internet of Things and Wi-Fi Tracking in Smart CitiesInternational Working Conference on Transfer and Diffusion of IT (TDIT), Jun 2019, Accra, Ghana. pp.364-381, ⟨10.1007/978-3-030-20671-0_25⟩
Conference papers
hal-02294719v1
|
||
|
Factors Driving the Adoption of Mobile Banking App: An Empirical Assessment in the Less Digitalized EconomyInternational Working Conference on Transfer and Diffusion of IT (TDIT), Dec 2020, Tiruchirappalli, India. pp.114-125, ⟨10.1007/978-3-030-64861-9_11⟩
Conference papers
hal-03744789v1
|
||
|
On Efficient Processing of Complicated Cloaked Region for Location Privacy Aware Nearest-Neighbor Queries1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.101-110, ⟨10.1007/978-3-642-36818-9_11⟩
Conference papers
hal-01480224v1
|
||
|
Online Self-disclosure: From Users’ Regrets to Instructional Awareness1st International Cross-Domain Conference for Machine Learning and Knowledge Extraction (CD-MAKE), Aug 2017, Reggio, Italy. pp.83-102, ⟨10.1007/978-3-319-66808-6_7⟩
Conference papers
hal-01677149v1
|
||
|
A Simplified Privacy Preserving Message Delivery Protocol in VDTNs1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.416-425, ⟨10.1007/978-3-642-36818-9_46⟩
Conference papers
hal-01480200v1
|
||
|
Modeling and Reasoning About Privacy-Consent Requirements11th IFIP Working Conference on The Practice of Enterprise Modeling (PoEM), Oct 2018, Vienna, Austria. pp.238-254, ⟨10.1007/978-3-030-02302-7_15⟩
Conference papers
hal-02156452v1
|
||
|
Health Care Reform and the Internet1st Availability, Reliability and Security (CD-ARES), Aug 2011, Vienna, Austria. pp.82-88, ⟨10.1007/978-3-642-23300-5_7⟩
Conference papers
hal-01590392v1
|
||
|
Are Video Resumes Preferred by Job Applicants? Information Technology in RecruitmentInternational Working Conference on Transfer and Diffusion of IT (TDIT), Dec 2020, Tiruchirappalli, India. pp.138-149, ⟨10.1007/978-3-030-64861-9_13⟩
Conference papers
hal-03744779v1
|
||
|
A Full Privacy-Preserving Scheme for Location-Based Services2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.596-601, ⟨10.1007/978-3-642-55032-4_61⟩
Conference papers
hal-01397275v1
|
||
|
Semantic-Aware Obfuscation for Location Privacy at Database Level1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.111-120, ⟨10.1007/978-3-642-36818-9_12⟩
Conference papers
hal-01480225v1
|
||
|
A Survey of Security and Privacy Issues for Biometrics Based Remote Authentication in Cloud13th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Nov 2014, Ho Chi Minh City, Vietnam. pp.112-121, ⟨10.1007/978-3-662-45237-0_12⟩
Conference papers
hal-01405569v1
|
||
|
Securing Location-Aware Services Based on Online/Offline Signatures in VANETs1st Availability, Reliability and Security (CD-ARES), Aug 2011, Vienna, Austria. pp.271-285, ⟨10.1007/978-3-642-23300-5_21⟩
Conference papers
hal-01590395v1
|
||
|
Towards the Implementation of the EU-Wide “Once-Only Principle”: Perceptions of Citizens in the DACH-Region17th International Conference on Electronic Government (EGOV), Sep 2018, Krems, Austria. pp.155-166, ⟨10.1007/978-3-319-98690-6_14⟩
Conference papers
hal-01961531v1
|
||
|
Public Policy and Regulatory Challenges of Artificial Intelligence (AI)International Working Conference on Transfer and Diffusion of IT (TDIT), Dec 2020, Tiruchirappalli, India. pp.100-111, ⟨10.1007/978-3-030-64849-7_10⟩
Conference papers
hal-03701826v1
|
||
|
Cloud-Based Privacy Aware Preference Aggregation Service1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.208-223
Conference papers
hal-01506784v1
|
||
|
Adaptive User-Centered SecurityInternational Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Sep 2014, Fribourg, Switzerland. pp.94-109, ⟨10.1007/978-3-319-10975-6_7⟩
Conference papers
hal-01403988v1
|
||
|
A Social Cyber Contract Theory Model for Understanding National Cyber Strategies16th International Conference on Electronic Government (EGOV), Sep 2017, St. Petersburg, Russia. pp.166-176, ⟨10.1007/978-3-319-64677-0_14⟩
Conference papers
hal-01702970v1
|
||
|
The Mediating Role of Social Competition Identity Management Strategy in the Predictive Relationship between Susceptibility to Social Influence, Internet Privacy Concern, and Online Political Efficacy2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.492-499, ⟨10.1007/978-3-642-55032-4_50⟩
Conference papers
hal-01397263v1
|
||
|
Toward Secure Clustered Multi-Party Computation: A Privacy-Preserving Clustering Protocol1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.447-452, ⟨10.1007/978-3-642-36818-9_49⟩
Conference papers
hal-01480202v1
|
||
|
Toward GDPR-Compliant Socio-Technical Systems: Modeling Language and Reasoning Framework10th IFIP Working Conference on The Practice of Enterprise Modeling (PoEM), Nov 2017, Leuven, Belgium. pp.236-250, ⟨10.1007/978-3-319-70241-4_16⟩
Conference papers
hal-01765249v1
|
||
|
A Threat to Friendship Privacy in FacebookInternational Conference on Availability, Reliability, and Security (CD-ARES), Aug 2016, Salzburg, Austria. pp.96-105, ⟨10.1007/978-3-319-45507-5_7⟩
Conference papers
hal-01635021v1
|
||
|
An Attribute Based Private Data Sharing Scheme for People-Centric Sensing Networks1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.393-407
Conference papers
hal-01506576v1
|
||
|
A Real-Time Privacy Amplification Scheme in Quantum Key Distribution1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.453-458, ⟨10.1007/978-3-642-36818-9_50⟩
Conference papers
hal-01480204v1
|
||
|
Current Advances, Trends and Challenges of Machine Learning and Knowledge Extraction: From Machine Learning to Explainable AI2nd International Cross-Domain Conference for Machine Learning and Knowledge Extraction (CD-MAKE), Aug 2018, Hamburg, Germany. pp.1-8, ⟨10.1007/978-3-319-99740-7_1⟩
Conference papers
hal-02060058v1
|
||
|
A Foundation for Requirements Analysis of Privacy Preserving SoftwareInternational Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Aug 2012, Prague, Czech Republic. pp.93-107, ⟨10.1007/978-3-642-32498-7_8⟩
Conference papers
hal-01542436v1
|
||
|
Fuzzy Logic Weight Estimation in Biometric-Enabled Co-authentication Systems2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.365-374, ⟨10.1007/978-3-642-55032-4_36⟩
Conference papers
hal-01397235v1
|
||
|
A Study on Context Services Model with Location Privacy1st Availability, Reliability and Security (CD-ARES), Aug 2011, Vienna, Austria. pp.321-329, ⟨10.1007/978-3-642-23300-5_25⟩
Conference papers
hal-01590410v1
|
||
|
The Interplay Between Privacy, Trust and Self-disclosure on Social Networking SitesInternational Working Conference on Transfer and Diffusion of IT (TDIT), Jun 2019, Accra, Ghana. pp.382-401, ⟨10.1007/978-3-030-20671-0_26⟩
Conference papers
hal-02294711v1
|
||
|
Semi-automated Information Security Risk Assessment Framework for Analyzing Enterprises Security Maturity Level13th International Conference on Research and Practical Issues of Enterprise Information Systems (CONFENIS), Dec 2019, Prague, Czech Republic. pp.141-152, ⟨10.1007/978-3-030-37632-1_13⟩
Conference papers
hal-03408622v1
|
- 1
- 2