Skip to main content

Research Repository

Advanced Search

All Outputs (2)

Privacy-preserving data acquisition protocol. (2010)
Conference Proceeding
Kwecka, Z., Buchanan, W. J., & Spiers, D. A. (2010). Privacy-preserving data acquisition protocol. In IEEE International Conference of Computational Methods in Electrical and Electronics Engineering (131-136). https://doi.org/10.1109/SIBIRCON.2010.5555325

Current investigative data acquisition techniques often breach human and natural rights of the data subject and can jeopardize an investigation. Often the investigators need to reveal to the data controller precise details of their suspect’s identity... Read More about Privacy-preserving data acquisition protocol..

Application and analysis of private matching schemes based on commutative cryptosystems. (2009)
Conference Proceeding
Kwecka, Z., Buchanan, W. J., & Spiers, D. A. (2009). Application and analysis of private matching schemes based on commutative cryptosystems.

Privacy issues are becoming a key focus with software systems. Surveys show that the invasion of privacy is among the things peo-ple fear the most from the coming years. These fears seem to be justified, in the light of recent events involving the UK... Read More about Application and analysis of private matching schemes based on commutative cryptosystems..