Searched for: subject%3A%22Privacy%255C%2Benhancing%255C%2Btechnologies%22
(1 - 4 of 4)
document
van Rooijen, A.L. (author), Bouma, H. (author), Pruim, R.H.R. (author), Baan, J. (author), Uijens, W.R. (author), van Mil, J.D. (author)
Person re-identification (Re-ID) is a valuable technique because it can assist in finding suspects after a terrorist attack. However, the machine learning algorithms for person Re-ID are usually trained on large datasets with images of many different people in a public space. This could pose privacy concerns for the people involved. One way to...
conference paper 2020
document
Lueks, W. (author), Everts, M.H. (author), Hoepman, J.H. (author)
Service providers are often reluctant to support anonymous access, because this makes it hard to deal with misbehaving users. Anonymous blacklisting and reputation systems can help prevent misbehaving users from causing more damage. However, by the time the user is blocked or has lost reputation, most of the damage has already been done. To help...
conference paper 2016
document
van Lieshout, M.J. (author), Kool, L. (author), van Schoonhoven, B. (author), de Jonge, M. (author)
Purpose: The purpose of this paper is to develop/elaborate the concept Privacy by Design (PbD) and to explore the validity of the PbD framework. Design/methodology/approach: Attention for alternative concepts, such as PbD, which might offer surplus value in safeguarding privacy, is growing. Using PbD to design for privacy in ICT systems is still...
article 2011
document
TNO Fysisch en Elektronisch Laboratorium (author), Meijers, J.J.H. (author)
Met grote regelmaat verschiinen berichten in de pers over het onderwerp privacy. Uit deze berichten blijkt vaak hoe genuanceerd de belangen van een gebruiker en een dienstenleverancier verstrengeld kunnen raken. Dit artikel gaat nader in op de nieuwste ontwikkelingen betreffende privacy verhogende technieken
article 1996
Searched for: subject%3A%22Privacy%255C%2Benhancing%255C%2Btechnologies%22
(1 - 4 of 4)