Date


Research Areas

Output Type

Download Available

4 results

Privacy-preserving data acquisition protocol.

Conference Proceeding
Kwecka, Z., Buchanan, W. J., & Spiers, D. A. (2010)
Privacy-preserving data acquisition protocol. In IEEE International Conference of Computational Methods in Electrical and Electronics Engineering. , (131-136). https://doi.org/10.1109/SIBIRCON.2010.5555325
Current investigative data acquisition techniques often breach human and natural rights of the data subject and can jeopardize an investigation. Often the investigators need t...

Schutz der Anonymität als Gemeinschaftsaufgabe – eine neue Generation von PETs?

Conference Proceeding
Kwecka, Z., Buchanan, W. J., Schafer, B. & Rauhofer, J. (2012)
Schutz der Anonymität als Gemeinschaftsaufgabe – eine neue Generation von PETs?. In INFORMATIK 2013
Technologies, der seine rechtstheoretische Motivation aus einem Verständnis der Privatsphäre als kollektivem Gut gewinnt. In diesem Modell willigen alle Mitglieder einer Grupp...

Validation of 1-N OT algorithms in privacy-preserving investigations.

Conference Proceeding
Kwecka, Z., Buchanan, W. J. & Saliou, L. (2007)
Validation of 1-N OT algorithms in privacy-preserving investigations
Most organisations relay on digital information systems (ISs) in day-to-day operations, and often sensitive data about employees and customers are stored in such systems. This...

Application and analysis of private matching schemes based on commutative cryptosystems.

Conference Proceeding
Kwecka, Z., Buchanan, W. J. & Spiers, D. A. (2008)
Application and analysis of private matching schemes based on commutative cryptosystems
Privacy issues are becoming a key focus with software systems. Surveys show that the invasion of privacy is among the things peo-ple fear the most from the coming years. These...