Showing 1 - 20 results of 158 for search '"privacy"', query time: 0.07s Refine Results
  1. 1

    Abstracting syntactic privacy notions via privacy games by Ankele, R, Simpson, A

    Published 2020
    “…We use and extend this work by defining privacy games for individual and group privacy within distributed environments. …”
    Conference item
  2. 2

    Privacy architectural strategies: an approach for achieving various levels of privacy protection by Alshammari, M, Simpson, A

    Published 2018
    “…A wide array of Privacy-Enhancing Technologies (PETs) have been proposed as technical measures to provide various levels of privacy protection. …”
    Conference item
  3. 3

    Formal models for privacy by Simpson, A, Abe, A

    Published 2016
    “…The concept of privacy is becoming increasingly important in all of our lives. …”
    Conference item
  4. 4

    A new privacy paradox: young people and privacy on social network sites by Bolsover, G, Blank, G, Dubois, E

    Published 2014
    “…There is a widespread impression that younger people are less concerned with privacy than older people. For example, Facebook founder Mark Zuckerberg justified changing default privacy settings to allow everyone to see and search for names, gender, city and other information by saying “Privacy is no longer a social norm”. …”
    Conference item
  5. 5

    Disentangling privacy in smart homes by Kraemer, MJ, Flechais, I

    Published 2018
    “…Researching Privacy in Smart Homes where society and technology overlap appears promising. …”
    Conference item
  6. 6

    Rethinking the proposition of privacy engineering by Ceross, A, Simpson, AC

    Published 2018
    “…The field of privacy engineering proposes a methodological framework for designing privacy-protecting information systems. …”
    Conference item
  7. 7

    Connected vehicles: a privacy analysis by Quinlan, M, Zhao, J, Simpson, A

    Published 2019
    “…We examine the telematics system of a production vehicle, and aim to ascertain some of the associated privacy-related threats. We also consider how this analysis might underpin further research.…”
    Conference item
  8. 8
  9. 9

    Future scenarios and challenges for security and privacy by Williams, M, Axon, L, Nurse, J, Creese, S

    Published 2016
    “…As our world becomes increasingly connected, it is critical we consider what implications current and future technologies have for security and privacy. We approach this challenge by surveying 30 predictions across industry, academia and international organisations to extract a number of common themes. …”
    Conference item
  10. 10

    Privacy, risk and personal health monitoring by Mittelstadt, B, Fairweather, NB, McBride, N, Shaw, M

    Published 2013
    “…In this paper, a critical overview of the treatment of privacy, risk and PHM in academic literature is offered. …”
    Conference item
  11. 11

    Bisimilarity distances for approximate differential privacy by Chistikov, D, Murawski, A, Purser, D

    Published 2018
    “…Differential privacy is a widely studied notion of privacy for various models of computation. …”
    Conference item
  12. 12

    Location Privacy of Distance Bounding Protocols by Rasmussen, K, Čapkun, S

    Published 2008
    “…We analyze distance bounding protocols in terms of their location privacy and we show that they leak information about the location and distance between communicating partners even to passive attackers. …”
    Conference item
  13. 13

    Will data protection eventually kill privacy? by Roosendaal, A, Wright, J

    Published 2017
    “…<p>It has often been stipulated that data protection has a focus on the information part of privacy. It is more narrow than privacy as such, but gives more specific rules and requirements for the legitimate processing of personal data. …”
    Conference item
  14. 14

    Asymmetric distances for approximate differential privacy by Chistikov, D, Murawski, A, Purser, D

    Published 2019
    “…Differential privacy is a widely studied notion of privacy for various models of computation, based on measuring differences between probability distributions. …”
    Conference item
  15. 15

    Perspectives on privacy in the use of online systems by Williams, M, Nurse, J

    Published 2016
    “…Our work considers this relationship in the context of privacy and the privacy expectations users have when using online systems. …”
    Conference item
  16. 16

    Mobile subscriber WiFi privacy by O'Hanlon, P, Borgaonkar, R, Hirschi, L

    Published 2017
    “…These attacks are possible due to a lack of sufficient privacy protection measures, which are exacerbated by preconfigured device profiles. …”
    Conference item
  17. 17

    The perfect storm: The privacy paradox and the Internet-of-Things by Williams, M, Nurse, J, Creese, S

    Published 2016
    “…<p>Privacy is a concept found throughout human history and opinion polls suggest that the public value this principle. …”
    Conference item
  18. 18
  19. 19
  20. 20