Privacy engineering

Results: 1416



#Item
41Privacy / Identity management / Digital rights / Human rights / Privacy engineering / Security engineering / Internet privacy / Medical privacy / Information privacy / Privacy Impact Assessment

Privacy by Design-Engineering Privacy Workshop 3 Report Executive Summary Within the last few years, privacy experts in industry, government and academia have called for new thinking that enables engineering privacy into

Add to Reading List

Source URL: cra.org

Language: English - Date: 2015-12-30 13:06:46
42Road traffic management / Road transport / Traffic law / Transportation engineering / Traffic signals / Traffic flow / Intelligent transportation system / Traffic light / Traffic / Privacy / Traffic simulation / Traffic light control and coordination

Towards Fine-Grained Urban Traffic Knowledge Extraction Using Mobile Sensing Xuegang (Jeff) Ban JEC 4034, CEE, Rensselaer Polytechnic Institute

Add to Reading List

Source URL: www.winlab.rutgers.edu

Language: English - Date: 2012-07-12 23:21:28
43Elections / Electronic voting / Human rights / Election technology / Voting system / Computer security / Privacy / Voting / Instant messaging / Electronic voting by country

Bilkent University Department of Computer Engineering Senior Design Project Smart-Vote: Electronic Voting System for Smartphones

Add to Reading List

Source URL: ivoteturkey.eu.pn

Language: English - Date: 2014-05-14 18:13:03
44Data modeling / Anonymity / Privacy / Relational model / Data protection / K-anonymity / Column / Row / Data anonymization / Table / Trie

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2015-02-13 02:42:25
45Internet privacy / Location-based service / Information privacy / Privacy / WHOIS / Privacy concerns with social networking services / P3P

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2015-07-06 14:15:37
46Humancomputer interaction / Usability / Human communication / Computer security / Paul Dourish / User interfaces / Lorrie Cranor / Usability engineering / User experience / Simson Garfinkel / Ethnomethodology / Privacy

Ethnomethodology and Usable Security: The Value of Descriptive Research for Graduate Students Hervé Saint-Louis, PhD Student, Faculty of Information, University of Toronto Instrumental, cognitive and behavioural approac

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2015-07-17 22:36:03
47Geolocation / Mobile technology / Aircraft instruments / Criminal investigation / Mobile phone tracking / Privacy / Radar / Wireless LAN

Received-Signal-Strength-Based Logical Positioning Resilient to Signal Fluctuation Thomas Locher, Roger Wattenhofer, Aaron Zollinger {lochert@student, , }.ethz.ch Computer Engineering an

Add to Reading List

Source URL: www.tik.ee.ethz.ch

Language: English - Date: 2015-05-18 12:15:55
48Computer network security / Network architecture / Computer networking / Crypto-anarchism / Internet privacy / Virtual private network / Routing / Traffic flow / Computer network

Traffic Matrix Estimation for Low-loss Routing in Hybrid Networks by George Manning Porter Research Project Submitted to the Department of Electrical Engineering and Computer Sciences, University of California at Berkele

Add to Reading List

Source URL: sahara.cs.berkeley.edu

Language: English - Date: 2004-05-11 21:34:04
49Professional ethics / Social philosophy / Emerging technologies / Ethics of technology / Privacy / Internet privacy / Business ethics / Ethics / Artificial intelligence / Engineering ethics / Outline of ethics / Computer ethics

Usable Security and Privacy in Technology Ethics Courses Patrick Gage Kelley Department of Computer Science University of New Mexico

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2015-07-17 22:36:03
50Cybercrime / Computer security / Social engineering / E-commerce / National security / Trend Micro / Phishing / Internet privacy / International cybercrime / Supply chain attack

White Paper - Blurring BoundariesSecurity Predictions for Small and Midsize Businesses

Add to Reading List

Source URL: apac.trendmicro.com

Language: English - Date: 2014-06-03 23:59:44
UPDATE