Browsing by Subject Privacy


jump to:
0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 5 to 23 of 23 < previous 
Published DateTitleAuthor(s)
Apr-2017Enhancing the Utility of Anonymized Data by Improving the Quality of Generalization HierarchiesAyala-Rivera, VanessaMcDonagh, PatrickCerqueus, ThomasMurphy, Liam, B.E.Thorpe, Christina
24-Aug-2018"The Grace Period Has Ended": An Approach to Operationalize GDPR RequirementsAyala-Rivera, VanessaPasquale, Liliana
2014How do libraries manage the ethical and privacy issues of RFID implementation? A qualitative investigation into the decision-making processes of ten librariesFerguson, StuartThornley, Clare V.Gibb, Forbes
14-May-2013How In-Home Technologies Mediate Caregiving Relationships in Later LifeHuber, LesaShankar, KalpanaConnelly, KayCaine, Kelly E.Camp, L. JeanWalker, Beth AnnBorrero, Lisa
18-Apr-2019Human Behavior Prediction Though Noninvasive and Privacy-Preserving Internet of Things (IoT) Assisted MonitoringXu, LinaPombo, Nuno
30-Jul-2016Improving the Utility of Anonymized Datasets through Dynamic Evaluation of Generalization HierarchiesAyala-Rivera, VanessaCerqueus, ThomasMurphy, Liam, B.E.Thorpe, Christina
Apr-2016Judicial Oversight of Surveillance: The Case of Ireland in Comparative PerspectiveMcIntyre, T.J.
6-Apr-2021The Kaleidoscope of Privacy: Differences across French, German, UK, and US GDPR Media DiscourseSanford, MaryYasseri, Taha
2010Pervasive Computing and an Aging Populace: Methodological Challenges for Understanding Privacy ImplicationsShankar, Kalpana
Oct-2013Privacy concerns in assisted living technologiesGarg, VaibhavCamp, L. JeanLorenzen-Huber, LesaShankar, KalpanaConnelly, Kay
May-2021Privacy Protected Blockchain Based Architecture and Implementation for Sharing of Students’ CredentialsMishra, Raaj AnandKalla, AnshumanBraeken, AnLiyanage, Madhusanka
Mar-2018Privacy, boundaries and smart homes for health: An ethnographic studyBurrows, AlisonCoyle, DavidGooberman-Hill, Rachael
20-Mar-2020Privacy-Aware Blockchain Innovation for 6G: Challenges and OpportunitiesNguyen, TriTran, NgocLoven, LauriKechadi, Tahar
10-May-2021The Roadmap to 6G Security and PrivacyPorambage, PawaniGur, GurkanOsorio, Diana Pamela MoyaLiyanage, MadhusankaGurtov, AndreiYlianttila, Mika
20-Jul-2020Robust and Lightweight Key Exchange (LKE) Protocol for Industry 4.0Gaba, Gurjot SinghKumar, GulshanMonga, HimanshuLiyanage, Madhusankaet al.
23-Mar-2021Survey on Blockchain based Smart Contracts: Technical Aspects and Future ResearchHewa, TharakaHu, YiningLiyanage, MadhusankaKanhare, SalilYlianttila, Mika
26-Feb-2021Survey on Multi-Access Edge Computing Security and PrivacyRanaweera, PasikaJurcut, Anca DeliaLiyanage, Madhusanka
Jul-2019A Survey on Security and Privacy of 5G Technologies: Potential Solutions, Recent Advancements and Future DirectionsKhan, RabiaKumar, PardeepJayakody, Dushantha Nalin K.Liyanage, Madhusanka
7-Sep-2017What Can I Help You With?: Infrequent Users Experiences of Intelligent Personal AssistantsCowan, Benjamin R.Pantidi, NadiaCoyle, DavidMorrissey, KellieClarke, P. (Peter)Al-Shehri, SaraEarley, DavidBandeira, Natasha