Auflistung Nach Schlagwort "Data privacy"
Anzeige der Dokumente 1-20 von 24
-
ASPIDA: A client-oriented platform for assessing websites security practices adoption and reward
(2021)The adoption of good security practices for the e-commerce business is a challenging problem. The enforcement of a strict legal framework is not always effective. On the other hand, simple recommendations and raising ... -
ASPIDA: An Observatory for Security and Privacy in the Greek e-Business Sector
(2021)Modern e-business policy aims to better frame and steer progress and advancements towards a legal and security aware framework. However, a large percentage of cases neglects the adoption of good security practices, exposing ... -
Connected and autonomous vehicles – Legal issues in Greece, Europe and USA
(2019)Autonomous (AV) and Connected Vehicle (CV), often mentioned as CAV’s, rush their way into automobile market. Consumer cars are increasingly equipped with systems that perform driving functions, either by themselves or by ... -
Data protection in smart cities: Application of the EU GDPR
(2019)Urban growth, combined with the development of digital technology, has led to the recent boom of smart cities worldwide. Smart cities make use of all available information and communications technology in the built environment ... -
EndoVAE: Generating Endoscopic Images with a Variational Autoencoder
(2022)The generalization performance of deep learning models is closely associated with the number and diversity of data available upon training. While in many applications there is a large number of data available in public, ... -
Fake injection strategies for private phonetic matching
(2012)In many aspects of everyday life, from education to health care and from economics to homeland security, information exchange involving companies or government agencies has become a common application. Locating the same ... -
A free terrain model for trajectory k-anonymity
(2008)This paper introduces a privacy model for location based services that utilizes collected movement data to identify parts of the user trajectories, where user privacy is at an elevated risk. To protect the privacy of the ... -
A game theoretic framework for data privacy preservation in recommender systems
(2011)We address the fundamental tradeoff between privacy preservation and high-quality recommendation stemming from a third party. Multiple users submit their ratings to a third party about items they have viewed. The third ... -
Handling big data: research challenges and future directions
(2016)Today, an enormous amount of data is being continuously generated in all walks of life by all kinds of devices and systems every day. A significant portion of such data is being captured, stored, aggregated and analyzed ... -
An internet of things architecture for preserving privacy of energy consumption
(2016)Energy consumption by residential customers represents today around 30 to 40% of the total consumed energy, with the residential loads often to be charged for significant contribution to the peak demands both seasonal and ... -
Machine learning for all: A more robust federated learning framework
(2019)Machine learning and especially deep learning are appropriate for solving multiple problems in various domains. Training such models though, demands significant processing power and requires large data-sets. Federated ... -
PLOT: Privacy in location based services: An open-ended toolbox
(2009)The widespread adoption of Location Based Services (LBSs) coupled with recent advances in location tracking technologies, pose serious concerns to user privacy. As a consequence, privacy preserving approaches have been ... -
Privacy preserving platform for profitable mobile crowd sensing and users' adoption
(2017)Mobile crowd sensing enables users to collaborate in terms of data collection. In practice, end users collect data through their smart devices and then share it with other users, who .nd it useful. A data request consists ... -
A quantitative and qualitative analysis of blocking in association rule hiding
(2004)Data mining provides the opportunity to extract useful information from large databases. Various techniques have been proposed in this context in order to extract this information in the most efficient way. However, ... -
Reference table based k-anonymous private blocking
(2012)Privacy Preserving Record Linkage is an emerging field of research which attempts to deal with the classical linkage problem from a privacy preserving point of view. In this paper we propose a novel approach for performing ... -
Secure aggregation of users' privacy preferences in shared IoT environments
(2021)Internet of Things (IoT) technology has emerged as a core aspect of everyday life, since the number of deployed devices increases exponentially day by day. IoT offers the automation of many actions and strengthens the ... -
Security and privacy in the internet of things using blockchain technology
(2019)The Internet of Things constitutes the latest paradigm shift in computing. We are soon going to be surrounded by billions of devices that will sense the real world and store produced data in the cloud. These data will ... -
Security and Privacy Concerns for Healthcare Wearable Devices and Emerging Alternative Approaches
(2022)The wide use of wearable devices rises a lot of concerns about the privacy and security of personal data that are collected and stored by such services. This concern is even higher when such data is produced by healthcare ... -
Security for 4G and 5G cellular networks: A survey of existing authentication and privacy-preserving schemes
(2018)This paper presents a comprehensive survey of existing authentication and privacy-preserving schemes for 4G and 5G cellular networks. We start by providing an overview of existing surveys that deal with 4G and 5G cellular ... -
Simple Mail Delivery Protocol: Recipient-based email delivery with anti-spam support
(2013)In this paper we propose a user based architecture for the email system, where the recipient of an email message manage its receipt in conjunction with both origin and destination email servers. Messages are kept to the ...