نتایج جستجو برای: privacy and surveillance
تعداد نتایج: 16846830 فیلتر نتایج به سال:
sofa628 busstation1111 backdoor1816 Server results Background. Recently, storage and processing large-scale visual media data are being outsourced to Cloud Data Centres (CDCs). However, the CDCs are always third party entities. Thus the privacy of the users' visual media data may be leaked to the public or unauthorized parties.In this paper we propose a method of privacy preserving foreground e...
This article surveys the rise of contact tracing technologies during COVID-19 pandemic and some privacy, ethical, human rights issues they raise. It examines relationship these to local public health initiatives, how privacy debate over apps made technology in cases less responsive agency needs. The suggests that as countries enter return normal phase, more important invasive disease surveillan...
Subscriber’s Privacy is in a constant conflict with security and accountability providing controls employed for network monitoring activities of service providers and enterprises. This paper presents the results of the author’s research in the field of distributed network security monitoring architectures and the proposal of such a system that incorporates cryptographic protocols and a group si...
With the growing ubiquitousness of pervasive sensing and toward ambient intelligence, surveillance becomes a very real privacy threat, where private gesture interaction is likely to be observed automatically interpreted by other (even benign) intelligence tools. We propose motion transfer, example-guided modification translate from default alphabets personal ones. Apart privacy, incentive use p...
Trust is the attitude of expectation that another will behave according to the constraints of morality... There can be no trust where there is no possibility of error. More specifically, man cannot know that he is trusted unless he has the right to act without constant surveillance so that he knows he can betray the trust. Privacy confers that essential right... Without privacy and the possibil...
Mobile computing enables users to compute and communicate almost regardless of their current location. However, as a side effect this technology considerably increased surveillance potential for user movements. Current research addresses location privacy rather patchwork-like than comprehensively. Thus, this paper presents a methodology for identifying, assessing, and comparing location privacy...
This paper presents an overview of the Drone Protect Task (DPT) of MediaEval 2015, its objectives, related dataset, and evaluation approach. Participants in this task were required to implement a privacy filter or a combination of filters to protect various personal information regions in the video sequences provided. The challenge was to achieve an adequate balance between the degree of privac...
In times of surveillance and data retention, sharing information often comes together with privacy concerns. However, information sharing has benefits, e.g. sharing log files for including the knowledge gained from a broader view for security analysis, or sharing healthcare data for the use in studies for improving medical treatments. We present an information sharing framework design that meet...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید