Search results

Jump to navigation Jump to search
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)
  • {{Main|Differential privacy}} ...writing things|url=https://desfontain.es/privacy/local-global-differential-privacy.html|access-date=2020-02-10|website=desfontain.es}}</ref> ...
    23 KB (3,351 words) - 12:30, 23 February 2025
  • {{Distinguish|Decentralized Privacy-Preserving Proximity Tracing}} ...alized systems is mostly technical and PEPP-PT is equally able to preserve privacy.<ref>{{Cite web|title=ROBERT-proximity-tracing/documents|url=https://github ...
    13 KB (1,838 words) - 13:34, 3 October 2024
  • ...ted Encryption|rfc=8452|last1=Gueron|first1=S.|date=April 2019|publisher=[[Internet Engineering Task Force|IETF]]|access-date=August 14, 2019|doi=10.17487/RFC8 AES-GCM-SIV is designed to preserve both privacy and integrity even if nonces are repeated. To accomplish this, encryption i ...
    4 KB (490 words) - 13:58, 8 January 2025
  • ...ceedings of the 2014 workshop on physical analytics |chapter=Analysing the privacy policies of Wi-Fi trackers |date=2014-06-11 |url=https://doi.org/10.1145/26 ...3=M.|last4=Lauradoux|first4=C.|date=2018|title=The Pitfalls of Hashing for Privacy|url=https://ieeexplore.ieee.org/document/8023740|journal=IEEE Communication ...
    8 KB (1,139 words) - 22:44, 21 November 2024
  • ...atanya |last1=Samarati |first1=Pierangela |date=1998 |website=Harvard Data Privacy Lab |access-date=April 12, 2017}}</ref> although the concept dates to a 198 ...=10.1142/S0218488502001648 | title=''k''-anonymity: a model for protecting privacy | last1=Sweeney | first1=Latanya | ...
    16 KB (2,201 words) - 19:24, 22 February 2025
  • The advent of [[electronic commerce|commerce on the Internet]] and faster computers raised concerns about the security of [[Electronic c *[[Pretty Good Privacy]] ...
    4 KB (567 words) - 13:46, 10 February 2023
  • ...04-10|title=Covid Watch Bluetooth Primer Blog Post|date=2020-03-07|website=Internet Archive|language=en|access-date=2020-03-07}}</ref> on the topic in early Ma ...m your smartphone could automate Covid-19 contact tracing while preserving privacy|date=2020-04-08|website=MIT News|language=en|access-date=2020-04-08}}</ref> ...
    26 KB (3,619 words) - 06:12, 18 August 2024
  • ...s]] artificial intelligence research, is not intended to invade individual privacy. Instead, DeepFace alerts individuals when their face appears in any photo ...cause of this, DeepFace was not released in the [[European Union]]. A data privacy law in the EU argued that Facebook's facial recognition did not comply with ...
    26 KB (3,713 words) - 12:24, 13 August 2024
  • == Privacy concerns == ...b.archive.org/web/20121103041504/http://www.google.com/intl/en-US/policies/privacy/|archive-date=3 November 2012|url-status=live}}</ref> ...
    19 KB (2,614 words) - 17:21, 14 February 2025
  • *[[DRE i with enhanced privacy]] ...]] system by using a real-time computation strategy and providing enhanced privacy. A touch-screen based prototype of the system was trialed in the [[Gateshea ...
    12 KB (1,867 words) - 22:36, 14 February 2025
  • ...c encryption]] that used RSALib, including [[BitLocker]] and [[Pretty Good Privacy|PGP]] ...ubiKey]] 4 tokens when used to generate RSA keys on-chip for [[Pretty Good Privacy|OpenPGP]] or [[FIPS 201|PIV]].<ref>{{cite web |last=Bucy |first=Daniel |dat ...
    10 KB (1,364 words) - 03:49, 15 January 2025
  • ...nd [[Pirate Chain]] have integrated Equihash for reasons such as security, privacy, and [[Application-specific integrated circuit|ASIC miner]] resistance.{{Ci {{Portalbar|Internet|Free and open-source software}} ...
    6 KB (786 words) - 19:36, 15 November 2024
  • ...title=Casper*: Query processing for location services without compromising privacy |journal=ACM Transactions on Database Systems |date=1 December 2009 |volume ...Thus, multiple solutions have been proposed to preserve and enhance users’ privacy when using location-based services. Among all the proposed mechanisms, spat ...
    55 KB (7,739 words) - 07:36, 21 December 2024
  • ...y algorithms used to protect privacy and digitally sign information on the internet.<ref name=":2" /><ref>{{Cite journal|title = Efficient Networks for Quantum ...signatures used to ensure the privacy and integrity of information on the internet today. ...
    19 KB (2,907 words) - 17:32, 15 September 2024
  • ...60612190952/http://www.techrepublic.com/article/the-undercover-war-on-your-internet-secrets-how-online-surveillance-cracked-our-trust-in-the-web/ | archive-dat ...me reasons.<ref>''[[Crypto: How the Code Rebels Beat the Government—Saving Privacy in the Digital Age]],'' Steven Levy, Penguin, 2001</ref> ...
    37 KB (5,170 words) - 07:12, 18 February 2025
  • ...e's George? – Currency Tracking Project – FAQs, Rules/User Guidelines, and Privacy Policy |publisher=Wheresgeorge.com |access-date=December 27, 2013}}</ref> .../www.wheresgeorge.com/rules.php#1 |title= FAQs, Rules/User Guidelines, and Privacy Policy |at=#1 Natural Circulation |website=Where's George?}}</ref> This rul ...
    18 KB (2,627 words) - 22:36, 23 January 2025
  • ....com]]</code> or <code>[[.net]]</code> domains but is independent of the [[Internet Corporation for Assigned Names and Numbers]], the main governing body for d ...g/en/system/files/files/iti-report-15may14-en.pdf | work=ICANN | title=The Internet Corporation for Assigned Names and Numbers Identifier Technology Innovation ...
    17 KB (2,356 words) - 23:18, 24 May 2024
  • {{Short description|Elliptic curve used in Internet cryptography}} ...}}</ref><ref>{{Cite web|title = The NSA Is Breaking Most Encryption on the Internet - Schneier on Security|url = https://www.schneier.com/blog/archives/2013/09 ...
    21 KB (2,850 words) - 01:51, 13 February 2025
  • ...P cookie|cookies]] to remember the impression count. Non-cookies [[privacy|privacy-preserving]] implementation is also available.{{Citation needed|date=Februa [[Category:Internet terminology]] ...
    16 KB (2,299 words) - 23:44, 16 December 2024
  • ...y |first1= Marc |title= Harvard Researchers Accused of Breaching Students' Privacy|journal= The Chronicle of Higher Education }}</ref><ref>{{citation |url= ht ...ning the degree distributional aspect of the network. The [[Association of Internet Researchers]] has a [[Listserv]] that constitutes the majority of discussio ...
    10 KB (1,431 words) - 03:10, 15 February 2025
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)