Skip to main content

Research Repository

Advanced Search

Validation of 1-N OT algorithms in privacy-preserving investigations. (2008)
Presentation / Conference Contribution
Kwecka, Z., Buchanan, W. J., & Saliou, L. (2008, June). Validation of 1-N OT algorithms in privacy-preserving investigations. Presented at 7th European Conference on Information Warfare and Security

Most organisations relay on digital information systems (ISs) in day-to-day operations, and often sensitive data about employees and customers are stored in such systems. This, effectively, makes ISs enhanced surveillance measures, which can reach fu... Read More about Validation of 1-N OT algorithms in privacy-preserving investigations..

Evaluation of digital identity using Windows CardSpace (2008)
Thesis
Fernandez Sepulveda, A. Evaluation of digital identity using Windows CardSpace. (Thesis). Edinburgh Napier University. http://researchrepository.napier.ac.uk/id/eprint/4032

The Internet was initially created for academic purposes, and due to its success, it has been extended to commercial environments such as e-commerce, banking, and email. As a result, Internet crime has also increased. This can take many forms, such a... Read More about Evaluation of digital identity using Windows CardSpace.

You are where you have been. (2008)
Presentation / Conference Contribution
Clarke, R. A., & Wigan, M. (2008, July). You are where you have been. Presented at Seminar on 'Location Privacy'

Location is a critical aspect of both privacy and surveillance. A detailed record of locations allows all sorts of other information to be linked together, adding to information about the subject and his or her associates in the same way that a uniq... Read More about You are where you have been..