Listar por tema "privacy"
Mostrando ítems 1-7 de 7
-
Efficient algorithms for distortion and blocking techniques in association rule hiding
(2007)Data mining provides the opportunity to extract useful information from large databases. Various techniques have been proposed in this context in order to extract this information in the most efficient way. However, ... -
Enabling Location Privacy and Medical Data Encryption in Patient Telemonitoring Systems
(2009)Patient telemonitoring systems (PTS) deal with the acquisition, processing, and secure transmission of a patient's physiological and physical parameters to a remote location, where expert medical knowledge is available. ... -
Reference table based k-anonymous private blocking
(2012)Privacy Preserving Record Linkage is an emerging field of research which attempts to deal with the classical linkage problem from a privacy preserving point of view. In this paper we propose a novel approach for performing ... -
Simple Mail Delivery Protocol: Recipient-based email delivery with anti-spam support
(2013)In this paper we propose a user based architecture for the email system, where the recipient of an email message manage its receipt in conjunction with both origin and destination email servers. Messages are kept to the ... -
A Systematic Review of Patients’ Values, Preferences, and Expectations for the Diagnosis and Treatment of Male Lower Urinary Tract Symptoms
(2021)Context: Understanding men's values and preferences in the context of personal, physical, emotional, relational, and social factors is important in optimising patient counselling, facilitating treatment decision-making, ... -
Towards secure, decentralised, and privacy friendly forensic analysis of vehicular data
(2021)The automotive industry has been transformed through technological progress during the past decade. Vehicles are equipped with multiple computing devices that offer safety, driving assistance, or multimedia services. Despite ... -
VIPSec defined
(2008)Secure end-to-end information exchange is a constant challenge in electronic communications. Novel security architectures and approaches are proposed constantly, to be followed by announcements of sophisticated attack ...