Privacy engineering

Results: 1416



#Item
391Artificial intelligence / Information / Semantic Web / Reasoning / Knowledge engineering / Semantic reasoner / Description logic / Inference / Completeness / Knowledge representation / Science / Ontology

Privacy-Preserving Reasoning on the Semantic Web Jie Bao, Giora Slutzki and Vasant Honavar Department of Computer Science, Iowa State University, Ames, IA. USA {baojie,slutzki,honavar}@cs.iastate.edu

Add to Reading List

Source URL: www.cs.iastate.edu

Language: English - Date: 2007-09-25 16:51:33
392Ringtone / Electronic engineering / Electronics / Law / Privacy law / Telemarketing / Telephone Consumer Protection Act

Microsoft Word - Complaint

Add to Reading List

Source URL: torrentfreak.com

Language: English - Date: 2015-02-20 02:42:32
393Internet ethics / Internet / Identity management / Social issues / Internet privacy / Privacy policy / HTTP cookie / Origin / P3P / Ethics / Computing / Privacy

Software Engineering Software Solutions Entelect Privacy Policy 1. Confidentiality Entelect Software (Pty) Ltd and its business divisions, MyActive, MyPayment and Encentivize, respect the rights of our users and visi

Add to Reading List

Source URL: cdn.entelectonline.co.za

Language: English - Date: 2013-12-17 04:37:10
394Data privacy / Privacy law / Cheltenham / Higher Education Statistics Agency / Data Protection Act / Information privacy / Privacy / Institute of Engineering / Ethics / Higher education in the United Kingdom / Computer law

Student Data Protection Statement (Fair Processing Notice) Use of Student Personal Information The IOE collects, holds and processes personal information of prospective, current and former students in order to fulfil its

Add to Reading List

Source URL: www.ioe.ac.uk

Language: English - Date: 2015-04-17 00:06:34
395Electronic engineering / Telecommunications engineering / Service set / Wireless access point / IEEE 802.11 / Wireless LAN / Skyhook Wireless / AOSS / Network detector / Wireless networking / Technology / Wi-Fi

LAPWiN: Location-Aided Probing for Protecting User Privacy in Wi-Fi Networks Yu Seung Kim, Yuan Tian, Le T. Nguyen, and Patrick Tague Carnegie Mellon University Email: {yuseungk, yt, lenguyen, tague}@cmu.edu Abstract—E

Add to Reading List

Source URL: wnss.sv.cmu.edu

Language: English - Date: 2014-07-18 19:01:13
396Technology / Privacy / Wireless / Electronic engineering / BlueBean / Impinj / Radio-frequency identification / Automatic identification and data capture / Human–computer interaction

1023_1_Connecting_the_Hardware

Add to Reading List

Source URL: www.electronicaestudio.com

Language: English - Date: 2011-01-06 11:07:25
397Internet privacy / Radio-frequency identification / 3M / Kalman filter / Cybernetics / Technology / Electronic engineering / Geolocation

Pelagic Fisheries Research Program http://www.soest.hawaii.edu/PFRP/ A mosaic of models for light-based geolocation: How to choose, what to be careful about, and future directions

Add to Reading List

Source URL: www.soest.hawaii.edu

Language: English - Date: 2007-11-26 13:06:58
398Automatic identification and data capture / Telecommunications engineering / Privacy / Wireless / Real-time locating system / Terso Solutions / Barcode technology in healthcare / Radio-frequency identification / Technology / Human–computer interaction

/87 Vertical: Steel /52 Indepth: Network Security /71

Add to Reading List

Source URL: www.homilimbu.com

Language: English - Date: 2009-09-17 03:04:49
399Social engineering / Spamming / Social psychology / Fraud / Advance-fee fraud / Internet fraud / Craigslist / Spam / Victimisation / Internet / Ethics / Crime

2013 IEEE Security and Privacy Workshops Craigslist Scams and Community Composition: Investigating Online Fraud Victimization Vaibhav Garg Drexel University

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2013-05-05 16:05:00
400Cryptographic software / Human rights / PGP / Webmail / Tor / Privacy / HTTP cookie / Google Chrome / Hushmail / Software / Internet privacy / Computing

International Journal of Engineering Trends and Technology (IJETT) – Volume 8 Number 2- FebPrivacy Shielding against Mass Surveillance Kashyap.V#1, Boominathan.P#2 #1

Add to Reading List

Source URL: cryptome.org

Language: English - Date: 2015-01-05 09:37:37
UPDATE