-
1
Abstracting syntactic privacy notions via privacy games
Published 2020“…We use and extend this work by defining privacy games for individual and group privacy within distributed environments. …”
Conference item -
2
Privacy architectural strategies: an approach for achieving various levels of privacy protection
Published 2018“…A wide array of Privacy-Enhancing Technologies (PETs) have been proposed as technical measures to provide various levels of privacy protection. …”
Conference item -
3
Formal models for privacy
Published 2016“…The concept of privacy is becoming increasingly important in all of our lives. …”
Conference item -
4
A new privacy paradox: young people and privacy on social network sites
Published 2014“…There is a widespread impression that younger people are less concerned with privacy than older people. For example, Facebook founder Mark Zuckerberg justified changing default privacy settings to allow everyone to see and search for names, gender, city and other information by saying “Privacy is no longer a social norm”. …”
Conference item -
5
Disentangling privacy in smart homes
Published 2018“…Researching Privacy in Smart Homes where society and technology overlap appears promising. …”
Conference item -
6
Rethinking the proposition of privacy engineering
Published 2018“…The field of privacy engineering proposes a methodological framework for designing privacy-protecting information systems. …”
Conference item -
7
Connected vehicles: a privacy analysis
Published 2019“…We examine the telematics system of a production vehicle, and aim to ascertain some of the associated privacy-related threats. We also consider how this analysis might underpin further research.…”
Conference item -
8
-
9
Future scenarios and challenges for security and privacy
Published 2016“…As our world becomes increasingly connected, it is critical we consider what implications current and future technologies have for security and privacy. We approach this challenge by surveying 30 predictions across industry, academia and international organisations to extract a number of common themes. …”
Conference item -
10
Privacy, risk and personal health monitoring
Published 2013“…In this paper, a critical overview of the treatment of privacy, risk and PHM in academic literature is offered. …”
Conference item -
11
Bisimilarity distances for approximate differential privacy
Published 2018“…Differential privacy is a widely studied notion of privacy for various models of computation. …”
Conference item -
12
Location Privacy of Distance Bounding Protocols
Published 2008“…We analyze distance bounding protocols in terms of their location privacy and we show that they leak information about the location and distance between communicating partners even to passive attackers. …”
Conference item -
13
Will data protection eventually kill privacy?
Published 2017“…<p>It has often been stipulated that data protection has a focus on the information part of privacy. It is more narrow than privacy as such, but gives more specific rules and requirements for the legitimate processing of personal data. …”
Conference item -
14
Asymmetric distances for approximate differential privacy
Published 2019“…Differential privacy is a widely studied notion of privacy for various models of computation, based on measuring differences between probability distributions. …”
Conference item -
15
Perspectives on privacy in the use of online systems
Published 2016“…Our work considers this relationship in the context of privacy and the privacy expectations users have when using online systems. …”
Conference item -
16
Mobile subscriber WiFi privacy
Published 2017“…These attacks are possible due to a lack of sufficient privacy protection measures, which are exacerbated by preconfigured device profiles. …”
Conference item -
17
The perfect storm: The privacy paradox and the Internet-of-Things
Published 2016“…<p>Privacy is a concept found throughout human history and opinion polls suggest that the public value this principle. …”
Conference item -
18
-
19
-
20