Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 484 matches
- 2024
- Stefan Albert Horstmann, Samuel Domiks, Marco Gutfleisch, Mindy Tran, Yasemin Acar, Veelasha Moonsamy, Alena Naiakshina:
"Those things are written by lawyers, and programmers are reading that." Mapping the Communication Gap Between Software Developers and Privacy Experts. Proc. Priv. Enhancing Technol. 2024(1): 151-170 (2024) - Calvin Hawkins, Bo Chen, Kasra Yazdani, Matthew T. Hale:
Node and Edge Differential Privacy for Graph Laplacian Spectra: Mechanisms and Scaling Laws. IEEE Trans. Netw. Sci. Eng. 11(2): 1690-1701 (2024) - Hyunsoo Lee, Yugyeong Jung, Hei Yiu Law, Seolyeong Bae, Uichin Lee:
PriviAware: Exploring Data Visualization and Dynamic Privacy Control Support for Data Collection in Mobile Sensing Research. CHI 2024: 787:1-787:17 - Diarmuid O'Reilly-Morgan, Elias Z. Tragos, James Geraci, Qinqin Wang, Neil Hurley, Barry Smyth, Aonghus Lawlor:
A Hybrid Decentralised Learning Topology for Recommendations with Improved Privacy. EuroMLSys@EuroSys 2024: 161-168 - Claudio Novelli, Federico Casolari, Philipp Hacker, Giorgio Spedicato, Luciano Floridi:
Generative AI in EU Law: Liability, Privacy, Intellectual Property, and Cybersecurity. CoRR abs/2401.07348 (2024) - 2023
- Jeffrey C. Sun:
Gaps, guesswork, and ghosts lurking in technology integration: Laws and policies applicable to student privacy. Br. J. Educ. Technol. 54(6): 1604-1618 (2023) - Burkhard Schafer, Jo Briggs, Wendy Moncur, Emma Nicol, Leif Azzopardi:
What the Dickens: Post-mortem privacy and intergenerational trust. Comput. Law Secur. Rev. 49: 105800 (2023) - O. L. van Daalen:
The right to encryption: Privacy as preventing unlawful access. Comput. Law Secur. Rev. 49: 105804 (2023) - Jose Tomas Llanos, Madeline Carr, Omer F. Rana:
Using the blockchain to enable transparent and auditable processing of personal data in cloud- based services: Lessons from the Privacy-Aware Cloud Ecosystems (PACE) project. Comput. Law Secur. Rev. 51: 105873 (2023) - A. M. Mooij:
Reconciling transparency and privacy through the European Digital Identity. Comput. Law Secur. Rev. 48: 105796 (2023) - Waleed Halboob, Jalal Al-Muhtadi:
Computer Forensics Framework for Efficient and Lawful Privacy-Preserved Investigation. Comput. Syst. Sci. Eng. 45(2): 2071-2092 (2023) - Zhicheng He:
From Privacy-Enhancing to Health Data Utilisation: The Traces of Anonymisation and Pseudonymisation in EU Data Protection Law. Digit. Soc. 2(2) (2023) - Yousuf Muhammad:
Data privacy laws in the USA. Int. J. Inf. Priv. Secur. Integr. 5(3): 238-249 (2023) - David Oliver Erdos:
Digital Death, Digital Assets and Post-Mortem Privacy by Edina Harbinja. Int. J. Law Inf. Technol. 31(4): 413-414 (2023) - Rebecca Ong:
Privacy and personal information protection in China's all-seeing state. Int. J. Law Inf. Technol. 31(4): 349-375 (2023) - Keika Mori, Tatsuya Nagai, Yuta Takata, Masaki Kamizono, Tatsuya Mori:
Analysis of Privacy Compliance by Classifying Policies Before and After the Japanese Law Revision. J. Inf. Process. 31: 829-841 (2023) - Abdullah Alabdulatif, Navod Neranjan Thilakarathne, Zaharaddeen Karami Lawal, Khairul Eahsun Fahim, Rufai Yusuf Zakari:
Internet of Nano-Things (IoNT): A Comprehensive Review from Architecture to Security and Privacy Challenges. Sensors 23(5): 2807 (2023) - Rizu Paudel, Ankit Shrestha, Prakriti Dumaru, Mahdi Nasrullah Al-Ameen:
"\"It doesn't just feel like something a lawyer slapped together.\"- Mental-Model-Based Privacy Policy for Third-Party Applications on Facebook". CSCW Companion 2023: 298-306 - Natalie Leesakul, Charles Morisset:
Position Paper: The role of law in achieving privacy and security measures in smart buildings from the GDPR context. EuroS&P Workshops 2023: 619-626 - Francesco Flammini:
Distance education boosting interdisciplinarity and internationalization: an experience report from "Ethics, Law and Privacy in Data and Analytics" at SUPSI. HCAIep 2023: 54 - Bjørn Aslak Juliussen, Jon Petter Rui, Dag Johansen:
Developing with Compliance in Mind: Addressing Data Protection Law, Cybersecurity Regulation, and AI Regulation During Software Development. Privacy and Identity Management 2023: 81-96 - Maria Grazia Porcedda:
The Effacement of Information Technology from EU Law: The Need for Collaborative Approaches to Redesign the EU's Regulatory Architecture. Privacy and Identity Management 2023: 20-28 - Konrad Kollnig, Lu Zhang, Jun Zhao, Nigel Shadbolt:
Before and after China's new Data Laws: Privacy in Apps. CoRR abs/2302.13585 (2023) - Naveen Sahu, Mitul Gajera, Amit Chaudhary, Hamish Ivey-Law:
SeDe: Balancing Blockchain Privacy and Regulatory Compliance by Selective De-Anonymization. CoRR abs/2311.08167 (2023) - Bogdan Ficiu, Neil D. Lawrence, Andrei Paleyes:
Automated discovery of trade-off between utility, privacy and fairness in machine learning models. CoRR abs/2311.15691 (2023) - Michael Brand, Hamish Ivey-Law, Tania Churchill:
FinTracer: A privacy-preserving mechanism for tracing electronic money. IACR Cryptol. ePrint Arch. 2023: 649 (2023) - 2022
- Georgios Georgiadis, Geert Poels:
Towards a privacy impact assessment methodology to support the requirements of the general data protection regulation in a big data analytics context: A systematic literature review. Comput. Law Secur. Rev. 44: 105640 (2022) - Graham Greenleaf, Bertil Cottier:
International and regional commitments in African data privacy laws: A comparative analysis. Comput. Law Secur. Rev. 44: 105638 (2022) - Uta Kohl:
What post-mortem privacy may teach us about privacy. Comput. Law Secur. Rev. 47: 105737 (2022) - Adrian Kuenzler:
What competition law can do for data privacy (and vice versa). Comput. Law Secur. Rev. 47: 105757 (2022)
skipping 454 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-14 02:45 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint