搜索结果: 16-30 共查到“工学 privacy”相关记录47条 . 查询时间(0.079 秒)
As the world grows more social and connects more online, privacy management is becoming more collaborative, according to Penn State researchers."This is a paradigm shift, in a lot of ways, because mos...
Researchers at the Harvard John A. Paulson School of Engineering and Applied Sciences have developed a technique that can quickly change the opacity of a window, turning it cloudy, clear or...
Theoretical computer science provides answers to data privacy problem
Theoretical computer science data privacy problem
2015/10/13
The promise of big data lies in researchers' ability to mine massive datasets for insights that can save lives, improve services and inform our understanding of the world.These data may be generated b...
We construct a fully collusion resistant tracing traitors system with sublinear size ciphertexts and constant size private keys. More precisely, let N be the total number of users. Our system generate...
We study privacy-preserving tests for proximity: Alice can test if she is close to Bob without either party revealing any other information about their location. We describe several secure protocols t...
Impact of Personal Privacy Devices for WAAS Aviation Users
Impact Personal Privacy Devices WAAS Aviation Users
2015/6/24
Personal privacy devices (PPDs) are low-cost jammers to mask GPS signals, so that the location of the host vehicle is not revealed to other parties. Although it is illegal to use PPDs in the United St...
Privacy and Security Risks and Requirements with Healthcare IT: Hitting a Home Run Instead of a Foul Ball
electronic discovery privacy security health information social media cloud computing wireless mobile devices
2014/12/20
Using baseball as a metaphor, this practical, engaging session will explore the security and privacy risks with a number of technologies for storing, handling and communicating health information and ...
Privacy-Aware Collaboration Among Untrusted Resource Constrained Devices
service providers individuals
2014/12/18
Individuals are increasingly encouraged to share private information with service providers. Privacy is relaxed to increase the utility of the data for the provider. This dissertation offers an altern...
Optimizing Linear Queries Under Differential Privacy
Adaptive Algorithm Differential privacy Linear Query Lower Bound Spectral Decomposition
2014/12/18
Private data analysis on statistical data has been addressed by many recent literatures. The goal of such analysis is to measure statistical properties of a database without revealing information of i...
Exploring Privacy and Personalization in Information Retrieval Applications
information retrieval personalization privacy web search
2014/12/18
A growing number of information retrieval applications rely on search behavior aggregated over many users. If aggregated data such as search query reformulations is not handled properly, it can allow ...
The Security and Privacy Implications of Energy-Proportional Computing
energy proportionality power analysis privacy security
2014/12/18
The parallel trends of greater energy-efficiency and more aggressive power management are yielding computers that inch closer to energy-proportional computing with every generation. Energy-proportiona...
Privacy-preserving Sanitization in Data Sharing
database social network privacy privacy-preserving data analysis
2014/12/18
In the era of big data, the prospect of analyzing, monitoring and investigating all sources of data starts to stand out in every aspect of our life. The benefit of such practices becomes concrete only...
![](http://www.firstlight.cn/upload/imgfile/201412/2/201412217142294.jpg)
Leading researchers to discuss privacy and security in a connected age(图)
discuss privacy and security connected age
2014/12/2
As we increasingly rely on the Internet to connect to everything from banks and electrical grids to medical devices and autonomous vehicles, we are exposed to new vulnerabilities that threaten our sec...
Leading researchers to discuss privacy and security in a connected age
Internet era banks electrical grids
2014/10/30
As we increasingly rely on the Internet to connect to everything from banks and electrical grids to medical devices and autonomous vehicles, we are exposed to new vulnerabilities that threaten our sec...
Carnegie Mellon, Microsoft Research automate privacy compliance for big data systems
Carnegie Mellon Microsoft Research automate privacy compliance big data systems
2014/6/12
PITTSBURGH—Web services companies, such as Facebook, Google and Microsoft, all make promises about how they will use personal information they gather. But ensuring that millions of lines of code in th...