UNI-MB - logo
UMNIK - logo
 

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources UM. For full access, REGISTER.

2 3 4 5 6
hits: 174,745
31.
  • Differentially Private Data... Differentially Private Data Publishing and Analysis: A Survey
    Tianqing Zhu; Gang Li; Wanlei Zhou ... IEEE transactions on knowledge and data engineering, 08/2017, Volume: 29, Issue: 8
    Journal Article
    Peer reviewed
    Open access

    Differential privacy is an essential and prevalent privacy model that has been widely explored in recent decades. This survey provides a comprehensive and structured overview of two research ...
Full text

PDF
32.
  • On Designing Satisfaction-R... On Designing Satisfaction-Ratio-Aware Truthful Incentive Mechanisms for [Formula Omitted]-Anonymity Location Privacy
    Zhang, Yuan; Tong, Wei; Zhong, Sheng IEEE transactions on information forensics and security, 01/2016, Volume: 11, Issue: 11
    Journal Article
    Peer reviewed

    To protect individuals' location privacy, an important privacy protection technique that can be used is Formula Omitted-anonymity, which requires at least Formula Omitted users to participate in an ...
Full text
33.
Full text

PDF
34.
Full text

PDF
35.
Full text

PDF
36.
  • Location Privacy Protection... Location Privacy Protection Based on Differential Privacy Strategy for Big Data in Industrial Internet of Things
    Yin, Chunyong; Xi, Jinwen; Sun, Ruxia ... IEEE transactions on industrial informatics, 08/2018, Volume: 14, Issue: 8
    Journal Article

    In the research of location privacy protection, the existing methods are mostly based on the traditional anonymization, fuzzy and cryptography technology, and little success in the big data ...
Full text
37.
  • iPrivacy: Image Privacy Pro... iPrivacy: Image Privacy Protection by Identifying Sensitive Objects via Deep Multi-Task Learning
    Yu, Jun; Zhang, Baopeng; Kuang, Zhengzhong ... IEEE transactions on information forensics and security 12, Issue: 5
    Journal Article
    Peer reviewed
    Open access

    To achieve automatic recommendation of privacy settings for image sharing, a new tool called iPrivacy (image privacy) is developed for releasing the burden from users on setting the privacy ...
Full text

PDF
38.
  • Blissfully ignorant: the ef... Blissfully ignorant: the effects of general privacy concerns, general institutional trust, and affect in the privacy calculus
    Kehr, Flavius; Kowatsch, Tobias; Wentzel, Daniel ... Information systems journal (Oxford, England), November 2015, Volume: 25, Issue: 6
    Journal Article
    Peer reviewed
    Open access

    Existing research on information privacy has mostly relied on the privacy calculus model, which views privacy‐related decision‐making as a rational process where individuals weigh the anticipated ...
Full text

PDF
39.
Full text

PDF
40.
  • Data capitalism and the use... Data capitalism and the user: An exploration of privacy cynicism in Germany
    Lutz, Christoph; Hoffmann, Christian Pieter; Ranzini, Giulia New media & society, 07/2020, Volume: 22, Issue: 7
    Journal Article
    Peer reviewed
    Open access

    Ever since empirical studies found only a weak, if any, relationship between privacy concerns and privacy behavior, scholars have struggled to explain the so-called privacy paradox. Today, a number ...
Full text

PDF
2 3 4 5 6
hits: 174,745

Load filters