• Aucun résultat trouvé

Security and Privacy Protection

Video Scrambling for Privacy Protection in Video Surveillance – Recent Results and Validation Framework

Video Scrambling for Privacy Protection in Video Surveillance – Recent Results and Validation Framework

... assessing and validating ...cryptographic security, compression efficiency, computational complexity, and ease of integration in existing video surveillance ...challenge and is the focus of ...

15

The challenge of industry challenges : the uneasy encounter between privacy protection and commercial expression

The challenge of industry challenges : the uneasy encounter between privacy protection and commercial expression

... debated, and enacted, Canadian Courts were also active in defining privacy only in a pondered way reminiscent of the United Kingdom’s ...Rights and Freedoms that protects against unreasonable search ...

112

Enhancing privacy protection in social network systems through decentralization and policy conflict management

Enhancing privacy protection in social network systems through decentralization and policy conflict management

... advertisement and monetization, to become a super-peer and thus facilitate new peers to join the ...IDs, and help them to search other ...communication and data retrieval are made di- rectly ...

181

Security and privacy in online social networks

Security and privacy in online social networks

... deploy protection against such attacks by restricting the number of login attempts or by using techniques that require human interaction such as CAPTCHAs ...analyze and bypass ...

230

Policy-based Privacy and Security Management for Collaborative E-education Systems

Policy-based Privacy and Security Management for Collaborative E-education Systems

... 4.3. Privacy Policies Privacy policies define the privacy of an operation that subjects perform and privacy of information that subjects ...the privacy for subject to create a ...

7

Privacy Protection in Real Time HEVC Standard Using Chaotic System

Privacy Protection in Real Time HEVC Standard Using Chaotic System

... Video protection and access control have gathered steam over recent ...time and power consuming and, thus, are not aligned with the real-time ...(ROI) security based on the tile concept ...

22

Enhancing information security and privacy by combining biometrics with cryptography

Enhancing information security and privacy by combining biometrics with cryptography

... interesting and emerging development in this research domain is to use multi-biometrics for cryptographic key ...unordered), and therefore, feature level fusion is a convenient ...] and difference in ...

230

Measuring Privacy Protection in Web Services

Measuring Privacy Protection in Web Services

... assessing and documenting the security risks associated with a system ...strengths and weaknesses of the system and serve as a basis for investigations into vulnerabilities and required ...

10

Privacy and Security in E-Learning

Privacy and Security in E-Learning

... PET and are not necessarily the best fit for the ...to privacy and security, it is a good starting point for online privacy ...network privacy, including Onion Routing and ...

21

RFID Security and Privacy

RFID Security and Privacy

... towards privacy and data protection, TG RFID cover all three security domains: safety, security and ...management and non-IT ...threats and weaknesses and ...

15

Dead reckoning : where we stand on privacy and security controls for the Internet of Things

Dead reckoning : where we stand on privacy and security controls for the Internet of Things

... Command and Control Regulation Vinton Cerf, chief architect of the TCP/IP protocol and co-founder of Internet Soci- ety, wrote that IoT privacy regulation “is tricky ...of privacy and ...

218

A new perspective of privacy protection: unique distinct l-SR diversity

A new perspective of privacy protection: unique distinct l-SR diversity

... Abstract—More and more public data sets which contain information about individuals are published in recent ...the privacy disclosure from such data sets makes the approaches of privacy ...

9

A Survey of Security Threats and Protection Mechanisms in Embedded Automotive Networks

A Survey of Security Threats and Protection Mechanisms in Embedded Automotive Networks

... Entry and Start (PKES) systems allow the drivers to unlock and start their cars while keeping their keys in their ...radius) and another near the targeted car, they were able to unlock it then start ...

13

Symbolic verification of privacy-type properties for security protocols with XOR

Symbolic verification of privacy-type properties for security protocols with XOR

... primitive, and protocols implemented on low-power devices, such as RFID tags, often rely on it because of its computational effi- ciency ...secrecy and authentication, termination is achieved in practice on ...

16

Towards a Context-Aware Security and Privacy as a Service in the Internet of Things

Towards a Context-Aware Security and Privacy as a Service in the Internet of Things

... location) and stores context information, also called low-level context, in the Context Information Base ...house and is walking in the ...date and time, Bobs location, Bobs network and ...

13

Guide for Assessment of the Architectural Speech Privacy and Speech Security of Closed Offices and Meeting Rooms

Guide for Assessment of the Architectural Speech Privacy and Speech Security of Closed Offices and Meeting Rooms

... speech privacy of closed offices and meeting ...speech security, which means very high degrees of speech ...speech privacy is used to indicate the privacy provided by the building ...

19

Controlling Irregular Migration in Canada: Reconciling Security Concerns with Human Rights Protection

Controlling Irregular Migration in Canada: Reconciling Security Concerns with Human Rights Protection

... Canadian Security Intelligence Service approved of the American decision to send ...— and rejected any idea of his repatriation of to Canada, for the reason that, under the Canadian Charter princi- ples, ...

44

Relationship between the privacy index and the speech privacy class

Relationship between the privacy index and the speech privacy class

... field and laboratory measurements In this section, results of extensive field and laboratory measurements will be used to validate the relationship between PI and SPC described ...source and ...

9

Security requirements analysis based on security and domain ontologies

Security requirements analysis based on security and domain ontologies

... deposit and dissemination of sci- entific research documents, whether they are pub- lished or ...teaching and research institutions in France or abroad, or from public or private research ...

4

Using Security and Domain ontologies for Security Requirements Analysis

Using Security and Domain ontologies for Security Requirements Analysis

... deposit and dissemination of sci- entific research documents, whether they are pub- lished or ...teaching and research institutions in France or abroad, or from public or private research ...

8

Show all 10000 documents...

Sujets connexes