Skip to main content

Research Repository

Advanced Search

All Outputs (4)

Schutz der Anonymität als Gemeinschaftsaufgabe – eine neue Generation von PETs? (2013)
Conference Proceeding
Kwecka, Z., Buchanan, W. J., Schafer, B., & Rauhofer, J. (2013). Schutz der Anonymität als Gemeinschaftsaufgabe – eine neue Generation von PETs?. In INFORMATIK 2013

Technologies, der seine rechtstheoretische Motivation aus einem Verständnis der Privatsphäre als kollektivem Gut gewinnt. In diesem Modell willigen alle Mitglieder einer Gruppe in eine theoretisches Risiko ein, um gegenseitig ihre Anonymität und dami... Read More about Schutz der Anonymität als Gemeinschaftsaufgabe – eine neue Generation von PETs?.

Privacy-preserving data acquisition protocol. (2010)
Conference Proceeding
Kwecka, Z., Buchanan, W. J., & Spiers, D. A. (2010). Privacy-preserving data acquisition protocol. In IEEE International Conference of Computational Methods in Electrical and Electronics Engineering (131-136). https://doi.org/10.1109/SIBIRCON.2010.5555325

Current investigative data acquisition techniques often breach human and natural rights of the data subject and can jeopardize an investigation. Often the investigators need to reveal to the data controller precise details of their suspect’s identity... Read More about Privacy-preserving data acquisition protocol..

Application and analysis of private matching schemes based on commutative cryptosystems. (2009)
Conference Proceeding
Kwecka, Z., Buchanan, W. J., & Spiers, D. A. (2009). Application and analysis of private matching schemes based on commutative cryptosystems.

Privacy issues are becoming a key focus with software systems. Surveys show that the invasion of privacy is among the things peo-ple fear the most from the coming years. These fears seem to be justified, in the light of recent events involving the UK... Read More about Application and analysis of private matching schemes based on commutative cryptosystems..

Validation of 1-N OT algorithms in privacy-preserving investigations. (2008)
Conference Proceeding
Kwecka, Z., Buchanan, W. J., & Saliou, L. (2008). Validation of 1-N OT algorithms in privacy-preserving investigations.

Most organisations relay on digital information systems (ISs) in day-to-day operations, and often sensitive data about employees and customers are stored in such systems. This, effectively, makes ISs enhanced surveillance measures, which can reach fu... Read More about Validation of 1-N OT algorithms in privacy-preserving investigations..