Privacy engineering

Results: 1416



#Item
151Confidence tricks / Spamming / Theft / Phishing / Social engineering / Identity theft / Ethics / Password / Internet privacy / Crime / Security / Computer crimes

Cybersecurity Commissioner Adam Hamm Types of Cyber Crime Identity Theft

Add to Reading List

Source URL: ereg.naic.org

Language: English - Date: 2015-05-01 12:36:29
152Medical informatics / Privacy / Health informatics / International standards / Medical terms / Bell–LaPadula model / Medical privacy / Information privacy / Electronic health record / Medicine / Health / Computer security

Security Engineering: A Guide to Building Dependable Distributed Systems C H A P TE R 8 Multilateral Security

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2006-08-25 05:54:48
153Crime prevention / Cryptography / Cyberwarfare / Information security / Bruce Schneier / Security engineering / Computer security / Smart card / Burglar alarm / Security / National security / Safety

Preface For generations, people have defined and protected their property and their privacy using locks, fences, signatures, seals, account books, and meters. These have been supported by a host of social constructs rang

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2006-08-24 09:45:30
154Geolocation / Wireless / Mobile telecommunications / Internet privacy / Advertising / Geotargeting / Bluetooth / Near field communication / Mobile Web / Technology / Electronic engineering / Electronics

Mobile Geo targeting IAB Sweden 2014 | Mobile Task Force – Geotargeting www.iabsverige.se/standards-och-guidelines/geotargeting

Add to Reading List

Source URL: iabsverige.se

Language: English - Date: 2014-10-03 05:58:04
155Cypherpunks / Cryptographic software / Internet privacy / Tor / Institute of Electrical and Electronics Engineers / Nikita Borisov / Bangladesh University of Engineering and Technology / Apache Hadoop / Cloud computing / Computing / Software / Free software

Anupam Das Curriculum Vitae Contact Information

Add to Reading List

Source URL: web.engr.illinois.edu

Language: English - Date: 2014-12-01 15:23:20
156Relay / Internet / Tor / Onion routing / Anonymity / Reputation / Internet privacy / Electrical engineering / Electromagnetism

Analyzing an Adaptive Reputation Metric for Anonymity Systems Anupam Das Nikita Borisov

Add to Reading List

Source URL: web.engr.illinois.edu

Language: English - Date: 2014-04-09 16:42:43
157Radio-frequency identification / Ubiquitous computing / Wireless / Computing / Ambient intelligence / Association for Computing Machinery / USENIX / Trustworthy computing / Technology / Automatic identification and data capture / Privacy

Kevin Fu Department of Electrical Engineering and Computer Science http://web.eecs.umich.edu/%7Ekevinfu/ University of Michigan

Add to Reading List

Source URL: web.eecs.umich.edu

Language: English - Date: 2014-01-10 11:52:27
158Cyberwarfare / Computer security / Computer network security / Electronic commerce / Stuxnet / Vulnerability / Internet privacy / Security engineering / Software engineering / Security / Crime prevention / National security

From the Editors Sailing Away! F

Add to Reading List

Source URL: www.landwehr.org

Language: English - Date: 2014-08-18 19:01:47
159Ann Cavoukian / Information privacy / Lorrie Cranor / Internet privacy / Ronald Deibert / Surveillance / University of Toronto Faculty of Applied Science and Engineering / Stefan Brands / Privacy / Ethics / Year of birth missing

U of T wordmark_generic_black

Add to Reading List

Source URL: www.ipsi.utoronto.ca

Language: English - Date: 2010-12-10 14:32:16
160Power engineering / Relay / Transducers / Tor / Software / Electromagnetism / Electrical engineering / Internet privacy

Re3: Relay Reliability Reputation for Anonymity Systems Anupam Das, Nikita Borisov University of Illinois at Urbana-Champaign {das17,nikita}@illinois.edu

Add to Reading List

Source URL: web.engr.illinois.edu

Language: English - Date: 2014-04-01 17:41:36
UPDATE