Privacy engineering

Results: 1416



#Item
351Digital electronics / Intel Corporation / Intel / Microprocessor / Computer hardware / Electronic engineering / Electronics

Intel Corporate Privacy Rules Deed Poll 23rd February, 2015 Intel Corporate Privacy Rules

Add to Reading List

Source URL: www.intel.co.uk

Language: English - Date: 2015-03-06 11:07:11
352Ethics / Software engineering / Notation / Programming language / Information flow / Information privacy / Actor model / Functional programming / Control flow / Computing / Privacy / Programming paradigms

RESEARCH STATEMENT JEAN YANG The goal of my research is to help programmers build more reliable software with less effort. Towards this goal, I developed a programming model that allows selective automation of specific c

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2014-11-30 11:20:32
353Medical privacy / Internet privacy / Information privacy / Surveillance / Privacy / Ethics / Law

CyLab Rebecca Balebako" Engineering & Public Policy

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2014-09-04 11:16:13
354Lorrie Cranor / CUPS / Alan Westin / Information privacy / Privacy regulation theory / Privacy / Ethics / Internet privacy

CyLab Lorrie Faith Cranor" Engineering & Public Policy

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2013-09-03 23:15:57
355Project management / Systems engineering process / Scope / Technology / Computer networks / Internet privacy / Intranet

CM CMb 2015–03 Aligning intranet scope across project teams

Add to Reading List

Source URL: www.steptwo.com.au

Language: English - Date: 2015-05-06 20:16:00
356Software testing / Software bugs / Hacking / Vulnerability / Software engineering / Software construction / Parsing / Security / Computer security / Cyberwarfare

IEEE CS Security and Privacy Workshops 2nd LangSec Workshop LangSec: A Workshop on Language Theoretic Security Date & Venue: Thursday May 21, 2015, Fairmont Hotel, San Jose, CA

Add to Reading List

Source URL: spw15.langsec.org

Language: English - Date: 2015-03-09 17:49:27
357Internet privacy / Peer-to-peer / Privacy / Location obfuscation / Ethics / File sharing networks / Cloaking

Enabling Private Continuous Queries For Revealed User Locations ⋆ Chi-Yin Chow and Mohamed F. Mokbel Department of Computer Science and Engineering, University of Minnesota {cchow, mokbel}@cs.umn.edu

Add to Reading List

Source URL: www-users.cs.umn.edu

Language: English - Date: 2009-09-29 10:22:41
358Computing / Sensor node / Sensor / Telecommunications engineering / Technology / Wireless sensor network / Wireless networking

1 A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks Chi-Yin Chow, Student Member, IEEE, Mohamed F. Mokbel, Member, IEEE, and Tian He, Member, IEEE Abstract—Monitoring personal locations with

Add to Reading List

Source URL: www-users.cs.umn.edu

Language: English - Date: 2010-03-22 17:13:59
359Digital electronics / Intel Corporation / Intel / Microprocessor / Computer hardware / Electronic engineering / Electronics

Intel Corporate Privacy Rules Deed Poll 23rd February, 2015 Intel Corporate Privacy Rules

Add to Reading List

Source URL: www.intel.vn

Language: English - Date: 2015-03-06 12:35:14
360Digital electronics / Intel Corporation / Intel / Microprocessor / Computer hardware / Electronic engineering / Electronics

Intel Corporate Privacy Rules Deed Poll 23rd February, 2015 Intel Corporate Privacy Rules

Add to Reading List

Source URL: www.intel.de

Language: English - Date: 2015-03-06 11:07:11
UPDATE