Información del autor
Autor Krenn, Stephan |
Documentos disponibles escritos por este autor (5)
Crear una solicitud de compra Refinar búsqueda
TÃtulo : Cryptology and Network Security : 19th International Conference, CANS 2020, Vienna, Austria, December 14–16, 2020, Proceedings / Tipo de documento: documento electrónico Autores: Krenn, Stephan, ; Shulman, Haya, ; Vaudenay, Serge, Mención de edición: 1 ed. Editorial: [s.l.] : Springer Fecha de publicación: 2020 Número de páginas: XIII, 634 p. 160 ilustraciones, 56 ilustraciones en color. ISBN/ISSN/DL: 978-3-030-65411-5 Nota general: Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos. Idioma : Inglés (eng) Palabras clave: CriptografÃa Cifrado de datos (Informática) Protección de datos Software de la aplicacion IngenierÃa de software Red de computadoras CriptologÃa Seguridad de datos e información Aplicaciones informáticas y de sistemas de información Redes de comunicación informática Clasificación: 5.824 Resumen: Este libro constituye las actas arbitradas de la 19.ª Conferencia Internacional sobre CriptologÃa y Seguridad de Redes, CANS 2020, celebrada en Viena, Austria, en diciembre de 2020.* Los 30 artÃculos completos fueron cuidadosamente revisados ​​y seleccionados entre 118 presentaciones. Los artÃculos se centran en temas como la ciberseguridad; cartas credenciales; curvas elÃpticas; sistemas de pago; herramientas para mejorar la privacidad; criptografÃa ligera; y códigos y celosÃas. *La conferencia se realizó de manera virtual debido a la pandemia de COVID-19. Nota de contenido: Best Papers -- Cybersecurity -- Credentials -- Elliptic Curves -- Payment Systems -- Privacy-Enhancing Tools -- Lightweight Cryptography -- Codes and Lattices. Tipo de medio : Computadora Summary : This book constitutes the refereed proceedings of the 19th International Conference on Cryptology and Network Security, CANS 2020, held in Vienna, Austria, in December 2020.* The 30 full papers were carefully reviewed and selected from 118 submissions. The papers focus on topics such as cybersecurity; credentials; elliptic curves; payment systems; privacy-enhancing tools; lightweight cryptography; and codes and lattices. *The conference was held virtually due to the COVID-19 pandemic. Enlace de acceso : https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] Cryptology and Network Security : 19th International Conference, CANS 2020, Vienna, Austria, December 14–16, 2020, Proceedings / [documento electrónico] / Krenn, Stephan, ; Shulman, Haya, ; Vaudenay, Serge, . - 1 ed. . - [s.l.] : Springer, 2020 . - XIII, 634 p. 160 ilustraciones, 56 ilustraciones en color.
ISBN : 978-3-030-65411-5
Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos.
Idioma : Inglés (eng)
Palabras clave: CriptografÃa Cifrado de datos (Informática) Protección de datos Software de la aplicacion IngenierÃa de software Red de computadoras CriptologÃa Seguridad de datos e información Aplicaciones informáticas y de sistemas de información Redes de comunicación informática Clasificación: 5.824 Resumen: Este libro constituye las actas arbitradas de la 19.ª Conferencia Internacional sobre CriptologÃa y Seguridad de Redes, CANS 2020, celebrada en Viena, Austria, en diciembre de 2020.* Los 30 artÃculos completos fueron cuidadosamente revisados ​​y seleccionados entre 118 presentaciones. Los artÃculos se centran en temas como la ciberseguridad; cartas credenciales; curvas elÃpticas; sistemas de pago; herramientas para mejorar la privacidad; criptografÃa ligera; y códigos y celosÃas. *La conferencia se realizó de manera virtual debido a la pandemia de COVID-19. Nota de contenido: Best Papers -- Cybersecurity -- Credentials -- Elliptic Curves -- Payment Systems -- Privacy-Enhancing Tools -- Lightweight Cryptography -- Codes and Lattices. Tipo de medio : Computadora Summary : This book constitutes the refereed proceedings of the 19th International Conference on Cryptology and Network Security, CANS 2020, held in Vienna, Austria, in December 2020.* The 30 full papers were carefully reviewed and selected from 118 submissions. The papers focus on topics such as cybersecurity; credentials; elliptic curves; payment systems; privacy-enhancing tools; lightweight cryptography; and codes and lattices. *The conference was held virtually due to the COVID-19 pandemic. Enlace de acceso : https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...]
TÃtulo : Cryptology and Network Security : 20th International Conference, CANS 2021, Vienna, Austria, December 13-15, 2021, Proceedings Tipo de documento: documento electrónico Autores: Conti, Mauro, ; Stevens, Marc, ; Krenn, Stephan, Mención de edición: 1 ed. Editorial: [s.l.] : Springer Fecha de publicación: 2021 Número de páginas: XIII, 554 p. 56 ilustraciones ISBN/ISSN/DL: 978-3-030-92548-2 Nota general: Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos. Idioma : Inglés (eng) Palabras clave: CriptografÃa Cifrado de datos (Informática) Software de la aplicacion IngenierÃa de software Red de computadoras Visión por computador TeorÃa de la codificación TeorÃa de la información CriptologÃa Aplicaciones informáticas y de sistemas de información Redes de comunicación informática TeorÃa de la codificación y la información Clasificación: 5.824 Resumen: Este libro constituye las actas arbitradas de la 20.ª Conferencia Internacional sobre CriptologÃa y Seguridad de Redes, CANS 2021, que se celebró del 13 al 15 de diciembre de 2021. La conferencia estaba originalmente prevista para realizarse en Viena, Austria, y se cambió a un evento en lÃnea. debido a la pandemia de COVID-19. Los 25 artÃculos completos y 3 breves presentados en estas actas fueron cuidadosamente revisados ​​y seleccionados entre 85 presentaciones. Estaban organizados en secciones temáticas de la siguiente manera: Cifrado; firmas; esquemas y protocolos criptográficos; ataques y contramedidas; y atestación y verificación. Nota de contenido: Encryption -- Cross-Domain Attribute-Based Access Control Encryption -- Grain-128AEADv2: Strengthening the Initialization Against Key Reconstruction -- Partition Oracles from Weak Key Forgeries -- Practical Privacy-Preserving Face Identification based on FunctionHiding Functional Encryption -- The Matrix Reloaded: Multiplication Strategies in FrodoKEM -- Signatures -- BlindOR: An Effcient Lattice-Based Blind Signature Scheme from OR-Proofs -- Effcient Threshold-Optimal ECDSA -- GMMT: A Revocable Group Merkle Multi-Tree Signature Scheme -- Issuer-Hiding Attribute-Based Credentials -- Report and Trace Ring Signatures -- Selectively Linkable Group Signatures — Stronger Security and Preserved Verifiability -- Cryptographic Schemes and Protocols -- FO-like Combiners and Hybrid Post-Quantum Cryptography -- Linear-time oblivious permutations for SPDZ -- On the Higher-bit Version of Approximate Inhomogeneous Short Integer Solution Problem -- Practical Continuously Non-Malleable Randomness Encoders in the Random Oracle Model -- Attacks and Counter-Measures -- Countermeasures against Backdoor Attacks towards Malware Detectors -- Free By Design: On the Feasibility Of Free-Riding Attacks Against Zero-Rated Services -- Function-private Conditional Disclosure of Secrets and Multi-evaluation Threshold Distributed Point Functions -- How Distance-bounding can Detect Internet Traffc Hijacking -- SoK: Secure Memory Allocation -- Toward Learning Robust Detectors from Imbalanced Datasets Leveraging Weighted Adversarial Training -- Towards Quantum Large-Scale Password Guessing on Real-World Distributions -- Attestation and Verification -- Anonymous Transactions with Revocation and Auditing in Hyperledger Fabric -- Attestation Waves: Platform Trust via Remote Power Analysis -- How (not) to Achieve both Coercion Resistance and Cast as Intended Verifiability in Remote eVoting -- Subversion-Resistant Quasi-Adaptive NIZK and Applications to Modular zk-SNARKs -- THC: Practical and Cost-Effective Verification of Delegated Computation -- Tiramisu: Black-Box Simulation Extractable NIZKs in the Updatable CRS Model. Tipo de medio : Computadora Summary : This book constitutes the refereed proceedings of the 20th International Conference on Cryptology and Network Security, CANS 2021, which was held during December 13-15, 2021. The conference was originally planned to take place in Vienna, Austria, and changed to an online event due to the COVID-19 pandemic. The 25 full and 3 short papers presented in these proceedings were carefully reviewed and selected from 85 submissions. They were organized in topical sections as follows: Encryption; signatures; cryptographic schemes and protocols; attacks and counter-measures; and attestation and verification. Enlace de acceso : https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] Cryptology and Network Security : 20th International Conference, CANS 2021, Vienna, Austria, December 13-15, 2021, Proceedings [documento electrónico] / Conti, Mauro, ; Stevens, Marc, ; Krenn, Stephan, . - 1 ed. . - [s.l.] : Springer, 2021 . - XIII, 554 p. 56 ilustraciones.
ISBN : 978-3-030-92548-2
Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos.
Idioma : Inglés (eng)
Palabras clave: CriptografÃa Cifrado de datos (Informática) Software de la aplicacion IngenierÃa de software Red de computadoras Visión por computador TeorÃa de la codificación TeorÃa de la información CriptologÃa Aplicaciones informáticas y de sistemas de información Redes de comunicación informática TeorÃa de la codificación y la información Clasificación: 5.824 Resumen: Este libro constituye las actas arbitradas de la 20.ª Conferencia Internacional sobre CriptologÃa y Seguridad de Redes, CANS 2021, que se celebró del 13 al 15 de diciembre de 2021. La conferencia estaba originalmente prevista para realizarse en Viena, Austria, y se cambió a un evento en lÃnea. debido a la pandemia de COVID-19. Los 25 artÃculos completos y 3 breves presentados en estas actas fueron cuidadosamente revisados ​​y seleccionados entre 85 presentaciones. Estaban organizados en secciones temáticas de la siguiente manera: Cifrado; firmas; esquemas y protocolos criptográficos; ataques y contramedidas; y atestación y verificación. Nota de contenido: Encryption -- Cross-Domain Attribute-Based Access Control Encryption -- Grain-128AEADv2: Strengthening the Initialization Against Key Reconstruction -- Partition Oracles from Weak Key Forgeries -- Practical Privacy-Preserving Face Identification based on FunctionHiding Functional Encryption -- The Matrix Reloaded: Multiplication Strategies in FrodoKEM -- Signatures -- BlindOR: An Effcient Lattice-Based Blind Signature Scheme from OR-Proofs -- Effcient Threshold-Optimal ECDSA -- GMMT: A Revocable Group Merkle Multi-Tree Signature Scheme -- Issuer-Hiding Attribute-Based Credentials -- Report and Trace Ring Signatures -- Selectively Linkable Group Signatures — Stronger Security and Preserved Verifiability -- Cryptographic Schemes and Protocols -- FO-like Combiners and Hybrid Post-Quantum Cryptography -- Linear-time oblivious permutations for SPDZ -- On the Higher-bit Version of Approximate Inhomogeneous Short Integer Solution Problem -- Practical Continuously Non-Malleable Randomness Encoders in the Random Oracle Model -- Attacks and Counter-Measures -- Countermeasures against Backdoor Attacks towards Malware Detectors -- Free By Design: On the Feasibility Of Free-Riding Attacks Against Zero-Rated Services -- Function-private Conditional Disclosure of Secrets and Multi-evaluation Threshold Distributed Point Functions -- How Distance-bounding can Detect Internet Traffc Hijacking -- SoK: Secure Memory Allocation -- Toward Learning Robust Detectors from Imbalanced Datasets Leveraging Weighted Adversarial Training -- Towards Quantum Large-Scale Password Guessing on Real-World Distributions -- Attestation and Verification -- Anonymous Transactions with Revocation and Auditing in Hyperledger Fabric -- Attestation Waves: Platform Trust via Remote Power Analysis -- How (not) to Achieve both Coercion Resistance and Cast as Intended Verifiability in Remote eVoting -- Subversion-Resistant Quasi-Adaptive NIZK and Applications to Modular zk-SNARKs -- THC: Practical and Cost-Effective Verification of Delegated Computation -- Tiramisu: Black-Box Simulation Extractable NIZKs in the Updatable CRS Model. Tipo de medio : Computadora Summary : This book constitutes the refereed proceedings of the 20th International Conference on Cryptology and Network Security, CANS 2021, which was held during December 13-15, 2021. The conference was originally planned to take place in Vienna, Austria, and changed to an online event due to the COVID-19 pandemic. The 25 full and 3 short papers presented in these proceedings were carefully reviewed and selected from 85 submissions. They were organized in topical sections as follows: Encryption; signatures; cryptographic schemes and protocols; attacks and counter-measures; and attestation and verification. Enlace de acceso : https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...]
TÃtulo : Privacy and Identity Management : 15th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Maribor, Slovenia, September 21–23, 2020, Revised Selected Papers / Tipo de documento: documento electrónico Autores: Friedewald, Michael, ; Schiffner, Stefan, ; Krenn, Stephan, Mención de edición: 1 ed. Editorial: [s.l.] : Springer Fecha de publicación: 2021 Número de páginas: X, 265 p. 52 ilustraciones, 29 ilustraciones en color. ISBN/ISSN/DL: 978-3-030-72465-8 Nota general: Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos. Idioma : Inglés (eng) Palabras clave: Protección de datos Software de la aplicacion Ordenadores Seguridad de datos e información Aplicaciones informáticas y de sistemas de información Entornos informáticos Clasificación: 005.8 Ciencia de los computadores (Programación, programas de sistemas) Resumen: Este libro contiene artÃculos seleccionados presentados en la 15.ª Escuela Internacional de Verano IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 sobre Privacidad y Gestión de Identidad, celebrada en Maribor, Eslovenia, en septiembre de 2020.* Los 13 artÃculos completos incluidos en este El volumen fue cuidadosamente revisado y seleccionado entre 21 presentaciones. También se incluye un documento resumen de un tutorial. Como en años anteriores, uno de los objetivos de la Escuela de Verano IFIP fue fomentar la publicación de artÃculos de investigación exhaustivos por parte de estudiantes y académicos emergentes. Los artÃculos combinan enfoques interdisciplinarios para reunir una serie de perspectivas, como las técnicas, legales, regulatorias, socioeconómicas, sociales, polÃticas, éticas, antropológicas, filosóficas o psicológicas. *La escuela de verano se realizó de manera virtual. Nota de contenido: Tutorial Paper -- Don't Tell Them now (or at all) – End User Notification Duties under GDPR and NIS Directive -- Selected Student Papers -- Ethical Principles for Designing Responsible Offensive Cyber Security Training -- Longitudinal collection and analysis of mobile phone data with local differential privacy -- Privacy-preserving IDS for In-Car-Networks with Local Differential Privacy -- Strong customer authentication in online payments under GDPR and PSD2: a case of cumulative application -- Privacy in Payment in the Age of Central Bank Digital Currency -- Analysing drivers' preferences for privacy enhancing car-to-car communication systems -- Learning Analytics and Privacy - Respecting Privacy in Digital Learning Scenarios -- Preserving Privacy in Caller ID Applications -- "Identity management by design" with a technical Mediator under the GDPR -- Open about the open-rate? State of email tracking in marketing emails and its effects on user's privacy -- Privacy Respecting Data Sharing and Communication in mHealth: A Case Study -- Privacy-preserving Analytics for Data Markets using MPC -- Towards models for privacy preservation in the face of metadata exploitation. Tipo de medio : Computadora Summary : This book contains selected papers presented at the 15th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School on Privacy and Identity Management, held in Maribor, Slovenia, in September 2020.* The 13 full papers included in this volume were carefully reviewed and selected from 21 submissions. Also included is a summary paper of a tutorial. As in previous years, one of the goals of the IFIP Summer School was to encourage the publication of thorough research papers by students and emerging scholars. The papers combine interdisciplinary approaches to bring together a host of perspectives, such as technical, legal, regulatory, socio-economic, social or societal, political, ethical, anthropological, philosophical, or psychological perspectives. *The summer school was held virtually. Enlace de acceso : https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] Privacy and Identity Management : 15th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Maribor, Slovenia, September 21–23, 2020, Revised Selected Papers / [documento electrónico] / Friedewald, Michael, ; Schiffner, Stefan, ; Krenn, Stephan, . - 1 ed. . - [s.l.] : Springer, 2021 . - X, 265 p. 52 ilustraciones, 29 ilustraciones en color.
ISBN : 978-3-030-72465-8
Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos.
Idioma : Inglés (eng)
Palabras clave: Protección de datos Software de la aplicacion Ordenadores Seguridad de datos e información Aplicaciones informáticas y de sistemas de información Entornos informáticos Clasificación: 005.8 Ciencia de los computadores (Programación, programas de sistemas) Resumen: Este libro contiene artÃculos seleccionados presentados en la 15.ª Escuela Internacional de Verano IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 sobre Privacidad y Gestión de Identidad, celebrada en Maribor, Eslovenia, en septiembre de 2020.* Los 13 artÃculos completos incluidos en este El volumen fue cuidadosamente revisado y seleccionado entre 21 presentaciones. También se incluye un documento resumen de un tutorial. Como en años anteriores, uno de los objetivos de la Escuela de Verano IFIP fue fomentar la publicación de artÃculos de investigación exhaustivos por parte de estudiantes y académicos emergentes. Los artÃculos combinan enfoques interdisciplinarios para reunir una serie de perspectivas, como las técnicas, legales, regulatorias, socioeconómicas, sociales, polÃticas, éticas, antropológicas, filosóficas o psicológicas. *La escuela de verano se realizó de manera virtual. Nota de contenido: Tutorial Paper -- Don't Tell Them now (or at all) – End User Notification Duties under GDPR and NIS Directive -- Selected Student Papers -- Ethical Principles for Designing Responsible Offensive Cyber Security Training -- Longitudinal collection and analysis of mobile phone data with local differential privacy -- Privacy-preserving IDS for In-Car-Networks with Local Differential Privacy -- Strong customer authentication in online payments under GDPR and PSD2: a case of cumulative application -- Privacy in Payment in the Age of Central Bank Digital Currency -- Analysing drivers' preferences for privacy enhancing car-to-car communication systems -- Learning Analytics and Privacy - Respecting Privacy in Digital Learning Scenarios -- Preserving Privacy in Caller ID Applications -- "Identity management by design" with a technical Mediator under the GDPR -- Open about the open-rate? State of email tracking in marketing emails and its effects on user's privacy -- Privacy Respecting Data Sharing and Communication in mHealth: A Case Study -- Privacy-preserving Analytics for Data Markets using MPC -- Towards models for privacy preservation in the face of metadata exploitation. Tipo de medio : Computadora Summary : This book contains selected papers presented at the 15th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School on Privacy and Identity Management, held in Maribor, Slovenia, in September 2020.* The 13 full papers included in this volume were carefully reviewed and selected from 21 submissions. Also included is a summary paper of a tutorial. As in previous years, one of the goals of the IFIP Summer School was to encourage the publication of thorough research papers by students and emerging scholars. The papers combine interdisciplinary approaches to bring together a host of perspectives, such as technical, legal, regulatory, socio-economic, social or societal, political, ethical, anthropological, philosophical, or psychological perspectives. *The summer school was held virtually. Enlace de acceso : https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] Privacy and Identity Management. Data for Better Living: AI and Privacy / Friedewald, Michael ; Önen, Melek ; Lievens, Eva ; Krenn, Stephan ; Fricker, Samuel
TÃtulo : Privacy and Identity Management. Data for Better Living: AI and Privacy : 14th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Windisch, Switzerland, August 19–23, 2019, Revised Selected Papers / Tipo de documento: documento electrónico Autores: Friedewald, Michael, ; Önen, Melek, ; Lievens, Eva, ; Krenn, Stephan, ; Fricker, Samuel, Mención de edición: 1 ed. Editorial: [s.l.] : Springer Fecha de publicación: 2020 Número de páginas: XI, 480 p. 196 ilustraciones, 46 ilustraciones en color. ISBN/ISSN/DL: 978-3-030-42504-3 Nota general: Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos. Idioma : Inglés (eng) Palabras clave: Protección de datos Software de la aplicacion Inteligencia artificial Procesamiento de datos Red de computadoras CriptografÃa Cifrado de datos (Informática) Seguridad de datos e información Aplicaciones informáticas y de sistemas de información MinerÃa de datos y descubrimiento de conocimientos Redes de comunicación informática CriptologÃa Clasificación: 005.8 Ciencia de los computadores (Programación, programas de sistemas) Resumen: Este libro contiene artÃculos seleccionados presentados en la 14.ª Escuela Internacional de Verano IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 sobre Privacidad y Gestión de Identidad, celebrada en Windisch, Suiza, en agosto de 2019. Los 22 artÃculos completos incluidos en este volumen fueron cuidadosamente revisados ​​y seleccionados entre 31 presentaciones. También se incluyen artÃculos revisados ​​que resumen los resultados de los talleres y tutorÃas que se llevaron a cabo en la Escuela de Verano, asà como artÃculos aportados por varios de los oradores invitados. Los artÃculos combinan enfoques interdisciplinarios para reunir una serie de perspectivas, que se reflejan en las secciones temáticas: lenguaje y privacidad; derecho, ética e inteligencia artificial; biometrÃa y privacidad; herramientas que apoyan el cumplimiento de la protección de datos; clasificación de privacidad y evaluación de seguridad; tecnologÃas que mejoran la privacidad en contextos especÃficos. Los capÃtulos "¿Qué revela su mirada sobre usted? Sobre las implicaciones para la privacidad del seguimiento ocular" e "Implicaciones para la privacidad del análisis de voz y habla: divulgación de información por inferencia" son de acceso abierto bajo una licencia CC BY 4.0 en link.springer.com. Nota de contenido: Invited Papers -- Privacy as Enabler of Innovation -- Fair Enough? On Avoiding Bias in Data, Algorithms and Decisions -- Workshop and Tutorial Papers -- Opportunities and Challenges of Dynamic Consent in Commercial Big Data Analytics -- Identity Management: State of the Art, Challenges and Perspectives -- SoK: Cryptography for Neural Networks -- Workshop on Privacy Challenges in Public and Private Organizations -- News diversity and recommendation systems: Setting the interdisciplinary scene -- Language and Privacy -- Ontology-based Modeling of Privacy Vulnerabilities for Data Sharing -- On the Design of a Privacy-Centered Data Lifecycle for Smart Living Spaces -- Language-Based Mechanisms for Privacy by Design -- Law, Ethics and AI -- Get to Know Your Geek: Towards a Sociological Understanding of Incentives to Develop Privacy-Friendly Free and Open Source Software -- Recommended for you: "You don't need no thought control" – An analysis of news personalisation in lightof Article 22 GDPR -- Biometrics and Privacy -- Data privatizer for biometric applications and online identity management -- What Does Your Gaze Reveal About You? On the Privacy Implications of Eye Tracking -- Privacy Implications of Voice and Speech Analysis { Information Disclosure by Inference -- Border Control and Use of Biometrics: Reasons Why Right to Privacy can not be Absolute -- Tools Supporting Data Protection Compliance -- Making GDPR Usable: A Model to Support Usability Evaluations of Privacy -- Decision Support for Mobile App Selection via Automated Privacy Assessment -- A Tool-Assisted Risk Analysis for Data Protection Impact Assessment -- Privacy Classification and Security Assessment -- How to Protect my Privacy? - Classifying End-User Information Privacy Protection Behaviors -- Annotation-based Static Analysis for Personal Data Protection -- Order of Control and Perceived Control over Personal Information -- Aggregating Corporate Information Security Maturity Levels of Different Assets -- Privacy Enhancing Technologies in Specific Contexts -- Differential Privacy in Online Dating Recommendation Systems -- Distributed Ledger for Provenance Tracking of Artificial Intelligence Assets -- A Survey-based Exploration of Users' Awareness and their Willingness to Protect their Data with Smart Objects -- Self-Sovereign Identity Systems: Evaluation Framework -- Privacy in Location-Based Services and their Criticality based on Usage Context. Tipo de medio : Computadora Summary : This book contains selected papers presented at the 14th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School on Privacy and Identity Management, held in Windisch, Switzerland, in August 2019. The 22 full papers included in this volume were carefully reviewed and selected from 31 submissions. Also included are reviewed papers summarizing the results of workshops and tutorials that were held at the Summer School as well as papers contributed by several of the invited speakers. The papers combine interdisciplinary approaches to bring together a host of perspectives, which are reflected in the topical sections: language and privacy; law, ethics and AI; biometrics and privacy; tools supporting data protection compliance; privacy classification and security assessment; privacy enhancing technologies in specific contexts. The chapters "What Does Your Gaze Reveal About You? On the Privacy Implications of Eye Tracking" and "Privacy Implications of Voice and Speech Analysis - Information Disclosure by Inference" are open access under a CC BY 4.0 license at link.springer.com. Enlace de acceso : https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] Privacy and Identity Management. Data for Better Living: AI and Privacy : 14th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Windisch, Switzerland, August 19–23, 2019, Revised Selected Papers / [documento electrónico] / Friedewald, Michael, ; Önen, Melek, ; Lievens, Eva, ; Krenn, Stephan, ; Fricker, Samuel, . - 1 ed. . - [s.l.] : Springer, 2020 . - XI, 480 p. 196 ilustraciones, 46 ilustraciones en color.
ISBN : 978-3-030-42504-3
Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos.
Idioma : Inglés (eng)
Palabras clave: Protección de datos Software de la aplicacion Inteligencia artificial Procesamiento de datos Red de computadoras CriptografÃa Cifrado de datos (Informática) Seguridad de datos e información Aplicaciones informáticas y de sistemas de información MinerÃa de datos y descubrimiento de conocimientos Redes de comunicación informática CriptologÃa Clasificación: 005.8 Ciencia de los computadores (Programación, programas de sistemas) Resumen: Este libro contiene artÃculos seleccionados presentados en la 14.ª Escuela Internacional de Verano IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 sobre Privacidad y Gestión de Identidad, celebrada en Windisch, Suiza, en agosto de 2019. Los 22 artÃculos completos incluidos en este volumen fueron cuidadosamente revisados ​​y seleccionados entre 31 presentaciones. También se incluyen artÃculos revisados ​​que resumen los resultados de los talleres y tutorÃas que se llevaron a cabo en la Escuela de Verano, asà como artÃculos aportados por varios de los oradores invitados. Los artÃculos combinan enfoques interdisciplinarios para reunir una serie de perspectivas, que se reflejan en las secciones temáticas: lenguaje y privacidad; derecho, ética e inteligencia artificial; biometrÃa y privacidad; herramientas que apoyan el cumplimiento de la protección de datos; clasificación de privacidad y evaluación de seguridad; tecnologÃas que mejoran la privacidad en contextos especÃficos. Los capÃtulos "¿Qué revela su mirada sobre usted? Sobre las implicaciones para la privacidad del seguimiento ocular" e "Implicaciones para la privacidad del análisis de voz y habla: divulgación de información por inferencia" son de acceso abierto bajo una licencia CC BY 4.0 en link.springer.com. Nota de contenido: Invited Papers -- Privacy as Enabler of Innovation -- Fair Enough? On Avoiding Bias in Data, Algorithms and Decisions -- Workshop and Tutorial Papers -- Opportunities and Challenges of Dynamic Consent in Commercial Big Data Analytics -- Identity Management: State of the Art, Challenges and Perspectives -- SoK: Cryptography for Neural Networks -- Workshop on Privacy Challenges in Public and Private Organizations -- News diversity and recommendation systems: Setting the interdisciplinary scene -- Language and Privacy -- Ontology-based Modeling of Privacy Vulnerabilities for Data Sharing -- On the Design of a Privacy-Centered Data Lifecycle for Smart Living Spaces -- Language-Based Mechanisms for Privacy by Design -- Law, Ethics and AI -- Get to Know Your Geek: Towards a Sociological Understanding of Incentives to Develop Privacy-Friendly Free and Open Source Software -- Recommended for you: "You don't need no thought control" – An analysis of news personalisation in lightof Article 22 GDPR -- Biometrics and Privacy -- Data privatizer for biometric applications and online identity management -- What Does Your Gaze Reveal About You? On the Privacy Implications of Eye Tracking -- Privacy Implications of Voice and Speech Analysis { Information Disclosure by Inference -- Border Control and Use of Biometrics: Reasons Why Right to Privacy can not be Absolute -- Tools Supporting Data Protection Compliance -- Making GDPR Usable: A Model to Support Usability Evaluations of Privacy -- Decision Support for Mobile App Selection via Automated Privacy Assessment -- A Tool-Assisted Risk Analysis for Data Protection Impact Assessment -- Privacy Classification and Security Assessment -- How to Protect my Privacy? - Classifying End-User Information Privacy Protection Behaviors -- Annotation-based Static Analysis for Personal Data Protection -- Order of Control and Perceived Control over Personal Information -- Aggregating Corporate Information Security Maturity Levels of Different Assets -- Privacy Enhancing Technologies in Specific Contexts -- Differential Privacy in Online Dating Recommendation Systems -- Distributed Ledger for Provenance Tracking of Artificial Intelligence Assets -- A Survey-based Exploration of Users' Awareness and their Willingness to Protect their Data with Smart Objects -- Self-Sovereign Identity Systems: Evaluation Framework -- Privacy in Location-Based Services and their Criticality based on Usage Context. Tipo de medio : Computadora Summary : This book contains selected papers presented at the 14th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School on Privacy and Identity Management, held in Windisch, Switzerland, in August 2019. The 22 full papers included in this volume were carefully reviewed and selected from 31 submissions. Also included are reviewed papers summarizing the results of workshops and tutorials that were held at the Summer School as well as papers contributed by several of the invited speakers. The papers combine interdisciplinary approaches to bring together a host of perspectives, which are reflected in the topical sections: language and privacy; law, ethics and AI; biometrics and privacy; tools supporting data protection compliance; privacy classification and security assessment; privacy enhancing technologies in specific contexts. The chapters "What Does Your Gaze Reveal About You? On the Privacy Implications of Eye Tracking" and "Privacy Implications of Voice and Speech Analysis - Information Disclosure by Inference" are open access under a CC BY 4.0 license at link.springer.com. Enlace de acceso : https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] Privacy and Identity Management. Fairness, Accountability, and Transparency in the Age of Big Data / Kosta, Eleni ; Pierson, Jo ; Slamanig, Daniel ; Fischer-Hübner, Simone ; Krenn, Stephan
TÃtulo : Privacy and Identity Management. Fairness, Accountability, and Transparency in the Age of Big Data : 13th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Vienna, Austria, August 20-24, 2018, Revised Selected Papers Tipo de documento: documento electrónico Autores: Kosta, Eleni, ; Pierson, Jo, ; Slamanig, Daniel, ; Fischer-Hübner, Simone, ; Krenn, Stephan, Mención de edición: 1 ed. Editorial: [s.l.] : Springer Fecha de publicación: 2019 Número de páginas: X, 291 p. 175 ilustraciones, 29 ilustraciones en color. ISBN/ISSN/DL: 978-3-030-16744-8 Nota general: Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos. Idioma : Inglés (eng) Palabras clave: Protección de datos Ordenadores Software de la aplicacion Interfaces de usuario (sistemas informáticos) La interacción persona-ordenador Ciencias sociales Inteligencia artificial Seguridad de datos e información Entornos informáticos Aplicaciones informáticas y de sistemas de información Interfaces de usuario e interacción persona-computadora Aplicación informática en ciencias sociales y del comportamiento. Clasificación: 005.8 Ciencia de los computadores (Programación, programas de sistemas) Resumen: Este libro contiene artÃculos seleccionados presentados en la 13.ª Escuela Internacional de Verano IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 sobre Privacidad y Gestión de Identidad, celebrada en Viena, Austria, en agosto de 2018. Los 10 artÃculos completos incluidos en este volumen fueron cuidadosamente revisados ​​y seleccionados entre 27 presentaciones. También se incluyen artÃculos revisados ​​que resumen los resultados de los talleres y tutorÃas que se llevaron a cabo en la Escuela de Verano, asà como artÃculos aportados por varios de los oradores invitados. Los artÃculos combinan enfoques interdisciplinarios para reunir una serie de perspectivas: técnica, legal, regulatoria, socioeconómica, social, polÃtica, ética, antropológica, filosófica, histórica y psicológica. . Nota de contenido: A Causal Bayesian Networks Viewpoint on Fairness -- Sharing is caring, a boundary object approach to mapping and discussing personal data processing -- Who You Gonna Call When There's Something Wrong in Your Processing? Risk Assessment and Data Breach Notications in Practice -- Design and Security Assessment of Usable Multi-Factor Authentication and Single Sign-On Solutions for Mobile Applications: A Workshop Experience Report -- Towards Empowering the Human for Privacy Online -- Trust and Distrust: On Sense and Nonsense in Big Data -- GDPR transparency requirements and data privacy vocabularies -- Glycos: the basis for a peer-to-peer, private online social network -- GDPR and the Concept of Risk: The Role of risk, the Scope of risk and the technology involved -- Privacy Patterns for Pseudonymity -- Implementing GDPR in the Charity Sector: A Case Study -- Me and My Robot! Sharing Information with a New Friend -- chownIoT: Enhancing IoT Privacy by Automated Handling of Ownership Change -- Is Privacy Controllable? -- Assessing Theories for Research on Personal Data Transparency -- Data Protection by Design for cross-border electronic identication: does the eIDAS Interoperability Framework need to be modernised? -- Risk proling by law enforcement agencies in the Big Data era: Is there a need for transparency? Tipo de medio : Computadora Summary : This book contains selected papers presented at the 13th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School on Privacy and Identity Management, held in Vienna, Austria, in August 2018. The 10 full papers included in this volume were carefully reviewed and selected from 27 submissions. Also included are reviewed papers summarizing the results of workshops and tutorials that were held at the Summer School as well as papers contributed by several of the invited speakers. The papers combine interdisciplinary approaches to bring together a host of perspectives: technical, legal, regulatory, socio-economic, social, societal, political, ethical, anthropological, philosophical, historical, and psychological. . Enlace de acceso : https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] Privacy and Identity Management. Fairness, Accountability, and Transparency in the Age of Big Data : 13th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Vienna, Austria, August 20-24, 2018, Revised Selected Papers [documento electrónico] / Kosta, Eleni, ; Pierson, Jo, ; Slamanig, Daniel, ; Fischer-Hübner, Simone, ; Krenn, Stephan, . - 1 ed. . - [s.l.] : Springer, 2019 . - X, 291 p. 175 ilustraciones, 29 ilustraciones en color.
ISBN : 978-3-030-16744-8
Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos.
Idioma : Inglés (eng)
Palabras clave: Protección de datos Ordenadores Software de la aplicacion Interfaces de usuario (sistemas informáticos) La interacción persona-ordenador Ciencias sociales Inteligencia artificial Seguridad de datos e información Entornos informáticos Aplicaciones informáticas y de sistemas de información Interfaces de usuario e interacción persona-computadora Aplicación informática en ciencias sociales y del comportamiento. Clasificación: 005.8 Ciencia de los computadores (Programación, programas de sistemas) Resumen: Este libro contiene artÃculos seleccionados presentados en la 13.ª Escuela Internacional de Verano IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 sobre Privacidad y Gestión de Identidad, celebrada en Viena, Austria, en agosto de 2018. Los 10 artÃculos completos incluidos en este volumen fueron cuidadosamente revisados ​​y seleccionados entre 27 presentaciones. También se incluyen artÃculos revisados ​​que resumen los resultados de los talleres y tutorÃas que se llevaron a cabo en la Escuela de Verano, asà como artÃculos aportados por varios de los oradores invitados. Los artÃculos combinan enfoques interdisciplinarios para reunir una serie de perspectivas: técnica, legal, regulatoria, socioeconómica, social, polÃtica, ética, antropológica, filosófica, histórica y psicológica. . Nota de contenido: A Causal Bayesian Networks Viewpoint on Fairness -- Sharing is caring, a boundary object approach to mapping and discussing personal data processing -- Who You Gonna Call When There's Something Wrong in Your Processing? Risk Assessment and Data Breach Notications in Practice -- Design and Security Assessment of Usable Multi-Factor Authentication and Single Sign-On Solutions for Mobile Applications: A Workshop Experience Report -- Towards Empowering the Human for Privacy Online -- Trust and Distrust: On Sense and Nonsense in Big Data -- GDPR transparency requirements and data privacy vocabularies -- Glycos: the basis for a peer-to-peer, private online social network -- GDPR and the Concept of Risk: The Role of risk, the Scope of risk and the technology involved -- Privacy Patterns for Pseudonymity -- Implementing GDPR in the Charity Sector: A Case Study -- Me and My Robot! Sharing Information with a New Friend -- chownIoT: Enhancing IoT Privacy by Automated Handling of Ownership Change -- Is Privacy Controllable? -- Assessing Theories for Research on Personal Data Transparency -- Data Protection by Design for cross-border electronic identication: does the eIDAS Interoperability Framework need to be modernised? -- Risk proling by law enforcement agencies in the Big Data era: Is there a need for transparency? Tipo de medio : Computadora Summary : This book contains selected papers presented at the 13th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School on Privacy and Identity Management, held in Vienna, Austria, in August 2018. The 10 full papers included in this volume were carefully reviewed and selected from 27 submissions. Also included are reviewed papers summarizing the results of workshops and tutorials that were held at the Summer School as well as papers contributed by several of the invited speakers. The papers combine interdisciplinary approaches to bring together a host of perspectives: technical, legal, regulatory, socio-economic, social, societal, political, ethical, anthropological, philosophical, historical, and psychological. . Enlace de acceso : https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...]