Privacy engineering

Results: 1416



#Item
111Internet privacy / Network architecture / Broadband / Electronic engineering / Crypto-anarchism / Virtual private network / Voice over IP / Home network / Modem / Computing / Computer network security / Electronics

Business plan Metavector Siemens Atea Information and Communications

Add to Reading List

Source URL: www.osgi.org

Language: English - Date: 2013-02-05 20:22:03
112Google Search / Query / Web query classification / Information science / Information retrieval / Document retrieval

A Versatile Tool for Privacy-Enhanced Web Search Avi Arampatzis, George Drosatos, and Pavlos S. Efraimidis Department of Electrical and Computer Engineering Democritus University of Thrace, Xanthi, Greece {avi,gdr

Add to Reading List

Source URL: www.spice-center.org

Language: English - Date: 2013-10-09 09:26:55
113Telecommunications engineering / Computing / Personal computers / Privacy / Radio-frequency identification / Macintosh / Barcode / Mobile computing / Automatic identification and data capture / Technology / Wireless

series Light Industrial Mobile Computer Rugged and lightweight, the highly

Add to Reading List

Source URL: www.streckkodpartner.se

Language: English - Date: 2010-03-15 20:49:12
114Software / File sharing networks / Geolocation / Peer-to-peer / Location-based service / Client–server model / Tor / Internet Relay Chat / Cloaking / Computing / Internet privacy / Internet

Cloaking Locations for Anonymous Location Based Services: A Hybrid Approach Chengyang Zhang and Yan Huang Computer Science and Engineering Department University of North Texas

Add to Reading List

Source URL: www.cse.unt.edu

Language: English - Date: 2008-02-07 14:34:42
115Rogue software / Spyware / Social engineering / Chaos Computer Club / Trojan horse / Internet privacy / Rogue security software / Antivirus software / Malware / Espionage / System software

Microsoft Wordstate-trojans.docx

Add to Reading List

Source URL: www.statewatch.org

Language: English - Date: 2012-08-05 06:31:35
116

1 Poster: Privacy Aspects of Health Related Information Sharing in Online Social Networks Sadegh Torabi and Konstantin Beznosov Department of Electrical and Computer Engineering

Add to Reading List

Source URL: www.ieee-security.org

- Date: 2013-05-17 10:01:49
    117

    2014 IEEE Security and Privacy Workshops Analysis of Unintentional Insider Threats Deriving from Social Engineering Exploits Frank L. Greitzer PsyberAnalytix

    Add to Reading List

    Source URL: ieee-security.org

    Language: English - Date: 2014-04-30 03:10:15
      118

      Mix Zones: User Privacy in Location-aware Services Alastair R. Beresford and Frank Stajano Laboratory for Communication Engineering, University of Cambridge, JJ Thomson Avenue, Cambridge. CB3 0FD [arb33,fms27]@cam.ac.uk

      Add to Reading List

      Source URL: www.cl.cam.ac.uk

      Language: English - Date: 2007-04-02 12:11:45
        119

        2011 IEEE Symposium on Security and Privacy Using Fingerprint Authentication to Reduce System Security: An Empirical Study Hugh Wimberly, Lorie M. Liebrock Department of Computer Science & Engineering

        Add to Reading List

        Source URL: www.ieee-security.org

        Language: English - Date: 2011-04-10 18:06:50
          120

          2013 IEEE Security and Privacy Workshops Privacy Preserving Data Analytics for Smart Homes Antorweep Chakravorty, Tomasz Wlodarczyk, Chunming Rong Department of Computer & Electrical Engineering University of Stavanger

          Add to Reading List

          Source URL: www.ieee-security.org

          Language: English - Date: 2013-05-05 16:04:44
            UPDATE