Skip to main content

Research Repository

Advanced Search

Outputs (9)

“I am Spartacus”: privacy enhancing technologies, collaborative obfuscation and privacy as a public good (2014)
Journal Article
Kwecka, Z., Buchanan, W. J., Schafer, B., & Rauhofer, J. (2014). “I am Spartacus”: privacy enhancing technologies, collaborative obfuscation and privacy as a public good. Artificial Intelligence and Law, 22(2), 113-139. https://doi.org/10.1007/s10506-014-9155-5

The paper introduces an approach to privacy enhancing technologies that sees privacy not merely as an individual right, but as a public good. This understanding of privacy has recently gained ground in the debate on appropriate legal protection for p... Read More about “I am Spartacus”: privacy enhancing technologies, collaborative obfuscation and privacy as a public good.

Schutz der Anonymität als Gemeinschaftsaufgabe – eine neue Generation von PETs? (2013)
Conference Proceeding
Kwecka, Z., Buchanan, W. J., Schafer, B., & Rauhofer, J. (2013). Schutz der Anonymität als Gemeinschaftsaufgabe – eine neue Generation von PETs?. In INFORMATIK 2013

Technologies, der seine rechtstheoretische Motivation aus einem Verständnis der Privatsphäre als kollektivem Gut gewinnt. In diesem Modell willigen alle Mitglieder einer Gruppe in eine theoretisches Risiko ein, um gegenseitig ihre Anonymität und dami... Read More about Schutz der Anonymität als Gemeinschaftsaufgabe – eine neue Generation von PETs?.

A Privacy preserving method using privacy enhancing techniques for location based services (2012)
Journal Article
Buchanan, W. J., Kwecka, Z., & Ekonomou, E. (2012). A Privacy preserving method using privacy enhancing techniques for location based services. Mobile Networks and Applications, https://doi.org/10.1007/s11036-012-0362-6

Two of the major changes within computing, at the present time, are the move towards service-oriented architectures and the increasing usage of mobile devices to access these services. Along with this, as these devices are often moving, extra context... Read More about A Privacy preserving method using privacy enhancing techniques for location based services.

A novel privacy preserving method for the location tracking of mobile devices (2011)
Journal Article
Buchanan, W. J., & Kwecka, Z. (2011). A novel privacy preserving method for the location tracking of mobile devices. Wireless Networks,

Two of the major changes within computing, at the present time, are the move towards serviceoriented architectures and the increasing usage of mobile devices to access these services. Along with this, as these devices are often moving, extra context... Read More about A novel privacy preserving method for the location tracking of mobile devices.

Minimising collateral damage: privacy-preserving Investigative data acquisition platform. (2011)
Journal Article
Kwecka, Z., Buchanan, W. J., & Spiers, D. A. (2011). Minimising collateral damage: privacy-preserving Investigative data acquisition platform. International Journal of Information Technologies and Systems Approach, 4, 12-31. https://doi.org/10.4018/jitsa.2011070102

Investigators define invasion of privacy during their operations as collateral damage. Inquiries that require gathering data about potential suspects from third parties, such as banks, Internet Service Providers (ISPs) or employers are likely to impa... Read More about Minimising collateral damage: privacy-preserving Investigative data acquisition platform..

Cryptographic privacy-preserving enhancement method for investigative data acquisition (2011)
Thesis
Kwecka, Z. (2011). Cryptographic privacy-preserving enhancement method for investigative data acquisition. (Thesis). Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/4437

The current processes involved in the acquisition of investigative data from third parties, such as banks, Internet Service Providers (ISPs) and employers, by the public authorities can breach the rights of the individuals under investigation. This i... Read More about Cryptographic privacy-preserving enhancement method for investigative data acquisition.

Privacy-preserving data acquisition protocol. (2010)
Conference Proceeding
Kwecka, Z., Buchanan, W. J., & Spiers, D. A. (2010). Privacy-preserving data acquisition protocol. In IEEE International Conference of Computational Methods in Electrical and Electronics Engineering (131-136). https://doi.org/10.1109/SIBIRCON.2010.5555325

Current investigative data acquisition techniques often breach human and natural rights of the data subject and can jeopardize an investigation. Often the investigators need to reveal to the data controller precise details of their suspect’s identity... Read More about Privacy-preserving data acquisition protocol..

Application and analysis of private matching schemes based on commutative cryptosystems. (2009)
Conference Proceeding
Kwecka, Z., Buchanan, W. J., & Spiers, D. A. (2009). Application and analysis of private matching schemes based on commutative cryptosystems.

Privacy issues are becoming a key focus with software systems. Surveys show that the invasion of privacy is among the things peo-ple fear the most from the coming years. These fears seem to be justified, in the light of recent events involving the UK... Read More about Application and analysis of private matching schemes based on commutative cryptosystems..

Validation of 1-N OT algorithms in privacy-preserving investigations. (2008)
Conference Proceeding
Kwecka, Z., Buchanan, W. J., & Saliou, L. (2008). Validation of 1-N OT algorithms in privacy-preserving investigations.

Most organisations relay on digital information systems (ISs) in day-to-day operations, and often sensitive data about employees and customers are stored in such systems. This, effectively, makes ISs enhanced surveillance measures, which can reach fu... Read More about Validation of 1-N OT algorithms in privacy-preserving investigations..