Your selections:
NDN-RBE: An Accountable Privacy Aware Access Control Framework For NDN
- Sultan, Nazatul Haque, Varadharajan, Vijay, Dulal, Saurab, Camtepe, Seyit, Nepal, Surya
Securely sharing outsourced IoT data: A secure access and privacy preserving keyword search scheme
- Sultan, Nazatul H., Kermanshahi, Shabnam K., Tran, Hong Y., Lai, Shangqi, Varadharajan, Vijay, Nepal, Surya, Yi, Xun
Sorgner on Freedom, Violence, and Privacy
Designing palliative care facilities to better support patient and family care: a staff perspective
- McLaughlan, Rebecca, Richards, Kieran, Lipson-Smith, Ruby, Collins, Anna, Philip, Jennifer
When Differential Privacy Implies Syntactic Privacy
- Ekenstedt, Emelie, Ong, Lawrence, Liu, Yucheng, Johnson, Sarah, Yeoh, Phee Lep, Kliewer, Joerg
A review on security challenges in internet of things (IoT)
- Shaukat, Kamran, Alam, Tahla Mahboob, Hameed, Ibrahim A., Khan, Wasim Ahmed, Abbas, Nadir, Luo, Suhuai
Big data, black boxes and bias: the algorithmic identity and educational practice
A system for collecting and analyzing experience-sampling data
- Dennis, Simon, Yim, Hyungwook, Garrett, Paul, Sreekumar, Vishnu, Stone, Ben
- Dennis, Simon, Garrett, Paul, Yim, Hyungwook, Hamm, Jihun, Osth, Adam F., Sreekumar, Vishnu, Stone, Ben
A scoping review of qualitative research methods used with people in prison
- Abbott, Penelope, DiGiacomo, Michelle, Magin, Parker, Hu, Wendy
On the design of security mechanisms for the internet of things
- Pal, Shantanu, Hitchens, Michael, Varadharajan, Vijay
- Parsons, Bianca Farrugia, Ryder, Nathan
- Aljamea, Moudhi M., Brankovic, Ljiljana, Gao, Jia, Iliopoulos, Costas S., Samiruzzaman, M.
Quantifying privacy: a novel entropy-based measure of disclosure risk
- Alfalayleh, Mousa, Brankovic, Ljiljana
Surveillance, privacy, and social media
- Kibby, Marjorie, Fulton, Janet
Security as a service model for cloud environment
- Varadharajan, Vijay, Tupakula, Udaya
Triangle randomization for social network data anonymization
- Brankovic, Ljiljana, Lopez, Nacho, Miller, Mirka, Sebe, Francesc
Balancing privacy and utility in cross-company defect prediction
- Peters, Fayola, Menzies, Tim, Gong, Liang, Zhang, Hongyu
- King, Tatiana, Brankovic, Ljiljana, Gillard, Patricia
Securing an EHR in a health sector digital ecosystem
- Regan, Brian, Pusatli, O. Tolga, Lutton, Eugene, Athauda, Rukshan
Are you sure you would like to clear your session, including search history and login status?