X
Search Filters
Format Format
Format Format
X
Sort by Item Count (A-Z)
Filter by Count
Journal Article (4799) 4799
Newspaper Article (2934) 2934
Conference Proceeding (1272) 1272
Publication (540) 540
Book Chapter (341) 341
Magazine Article (325) 325
Book / eBook (266) 266
Trade Publication Article (230) 230
Government Document (194) 194
Newsletter (185) 185
Web Resource (64) 64
Dissertation (56) 56
Report (45) 45
Book Review (38) 38
Transcript (30) 30
Reference (18) 18
Paper (4) 4
Data Set (2) 2
Technical Report (1) 1
more...
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
privacy (7943) 7943
internet (1097) 1097
security (947) 947
privacy, right of (893) 893
computer science (765) 765
computer science, information systems (745) 745
computer security (741) 741
studies (708) 708
laws, regulations and rules (644) 644
social networks (620) 620
analysis (599) 599
information technology (594) 594
data security (581) 581
research (543) 543
telecommunications (530) 530
personal information (524) 524
ethics (505) 505
computer privacy (488) 488
right of privacy (464) 464
data integrity (457) 457
humans (454) 454
algorithms (415) 415
index medicus (414) 414
access control (413) 413
management (393) 393
software (378) 378
consumers (373) 373
communication (370) 370
cloud computing (368) 368
collaboration (366) 366
surveillance (362) 362
trust (348) 348
usage (347) 347
geheimhaltung (345) 345
engineering, electrical & electronic (340) 340
computer communication networks (332) 332
methods (329) 329
electronic commerce (324) 324
law (320) 320
internet of things (317) 317
technology (303) 303
cryptography (300) 300
protection (299) 299
safety and security measures (298) 298
authentication (297) 297
information systems (285) 285
artificial intelligence (283) 283
computers (279) 279
data protection (277) 277
data encryption (274) 274
data privacy (269) 269
innovations (268) 268
confidentiality (265) 265
big data (260) 260
web sites (260) 260
computer science, software engineering (257) 257
consumer protection (257) 257
computer science, theory & methods (251) 251
compliance (246) 246
business (238) 238
anonymity (234) 234
network security (232) 232
marketing (228) 228
researchers (223) 223
encryption (218) 218
computer information security (209) 209
information security & privacy (209) 209
data mining (205) 205
cybersecurity (204) 204
security measures (204) 204
location privacy (202) 202
sensors (200) 200
security management (199) 199
information management (196) 196
engineering (194) 194
networks (193) 193
biometrics (192) 192
patients (192) 192
wireless networks (190) 190
security and forensic science and technology (188) 188
computer networks (187) 187
computer systems (187) 187
it security and ethics (187) 187
social media (186) 186
information science & library science (182) 182
cyber security (179) 179
law enforcement (179) 179
national security (178) 178
management of computing and information systems (176) 176
blockchain (175) 175
human rights (175) 175
legislation (172) 172
medical records (172) 172
information (171) 171
automation (169) 169
employees (169) 169
computer system security (168) 168
electronic digital computers (168) 168
protection of computer systems (168) 168
security of computer systems (168) 168
more...
Library Location Library Location
Library Location Library Location
X
Sort by Item Count (A-Z)
Filter by Count
Online Resources - Online (28) 28
Engineering & Comp. Sci. - Stacks (23) 23
UofT at Mississauga - Stacks (22) 22
Robarts - Stacks (18) 18
Collection Dvlpm't (Acquisitions) - Vendor file (16) 16
Law (Bora Laskin) - Stacks (10) 10
UofT at Scarborough - Stacks (6) 6
Faculty of Information - Stacks (5) 5
UTL at Downsview - May be requested (5) 5
Collection Dvlpm't (Acquisitions) - Closed Orders (4) 4
Gerstein Science - Stacks (4) 4
St. Michael's College (John M. Kelly) - 2nd Floor (3) 3
Law (Bora Laskin) - Theses (2) 2
Media Commons - Microtexts (2) 2
Victoria University E.J. Pratt - Stacks (2) 2
Faculty of Information - May be requested in 6-10 wks (1) 1
New College (Ivey) - Stacks (1) 1
Robarts - Reference (1) 1
Trinity College (John W Graham) - Stacks (1) 1
University College (Laidlaw) - Stacks (1) 1
UofT at Mississauga - Reference (1) 1
more...
Language Language
Language Language
X
Sort by Item Count (A-Z)
Filter by Count
English (10390) 10390
German (16) 16
Spanish (11) 11
Chinese (10) 10
Japanese (10) 10
Korean (8) 8
French (4) 4
Portuguese (4) 4
Hungarian (2) 2
Turkish (2) 2
Croatian (1) 1
Italian (1) 1
Lithuanian (1) 1
Malay (1) 1
Norwegian (1) 1
Serbian (1) 1
Slovenian (1) 1
Ukrainian (1) 1
more...
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


2005, Lecture notes in computer science, ISBN 3540262032, Volume 3424., viii, 343
This book constitutes the thoroughly refereed post-proceedings of the 4th International Workshop on Privacy Enhancing Technologies, PET 2004, held in Toronto, Canada in May 2004... 
Computer security | Security measures | Computer networks | Congresses | Data Encryption | Computer Science | Information Storage and Retrieval | Computers and Society | Management of Computing and Information Systems | Computer Communication Networks | Operating Systems
eBook
Computers & Security, ISSN 0167-4048, 09/2015, Volume 53, pp. 1 - 17
Privacy-enhancing technologies (PETs) belong to a class of technical measures which aim at preserving the privacy of individuals or groups of individuals... 
Privacy | Survey | Taxonomy | Categorization | Privacy-enhancing technologies | Classification | INFORMATION SECURITY | COMPUTER SCIENCE, INFORMATION SYSTEMS | MODEL | Analysis
Journal Article
Software: Practice and Experience, ISSN 0038-0644, 07/2013, Volume 43, Issue 7, pp. 769 - 787
SUMMARY A privacy enhancing technology (PET) is an application or a mechanism that allows users to protect the privacy of their personally identifiable information... 
pattern | privacy | PET | pattern language | COMPUTER SCIENCE, SOFTWARE ENGINEERING | ANONYMITY | DESIGN | LOCATION PRIVACY | CRYPTOGRAPHY | Electronics | Privacy | On-line systems | Online | Monitoring | Computer programs
Journal Article
by Berger, B and Cho, H
GENOME BIOLOGY, ISSN 1474-760X, 07/2019, Volume 20, Issue 1, pp. 128 - 3
.... Traditional approaches to protect privacy have fundamental limitations. Here we discuss emerging privacy-enhancing technologies that can enable broader data sharing... 
BIOTECHNOLOGY & APPLIED MICROBIOLOGY | GENETICS & HEREDITY | Information Dissemination - ethics | Genome, Human | Genetic Privacy | Humans | Genomics - ethics | Access control | Medical research | Biomedical research | Genomics | Identification | Genomes | Family medical history | Medicine | Datasets | Studies | Privacy | Researchers | Databases | Data integrity | Collaboration | Information sharing
Journal Article
Pervasive and Mobile Computing, ISSN 1574-1192, 04/2019, Volume 55, pp. 76 - 95
... and how this exposure could be mitigated using multiple privacy enhancing technologies. A detailed review of existing privacy enhancing technologies is presented, in addition to their applications in the context of smart cities. 
Privacy enhancing technologies | Wireless sensor networks | Smart cities | Internet of Things | Security | CITY | COMPUTER SCIENCE, INFORMATION SYSTEMS | COMPUTATION | TELECOMMUNICATIONS | Surveys | Privacy | Sensors | Data entry
Journal Article
IEEE Security & Privacy, ISSN 1540-7993, 03/2009, Volume 7, Issue 2, pp. 56 - 62
Journal Article
Telematics and Informatics, ISSN 0736-5853, 05/2019, Volume 38, pp. 13 - 29
Journal Article
EURASIP Journal on Information Security, ISSN 2510-523X, 12/2017, Volume 2017, Issue 1, pp. 1 - 13
.... Privacy-enhancing technologies have been proposed to address these concerns. In this paper, the extension of privacy-enhancing technologies by wavelet-based multi-resolution analysis (MRA... 
Multiple resolutions | Engineering | Differential privacy | Systems and Data Security | Signal,Image and Speech Processing | Security Science and Technology | Communications Engineering, Networks | Masking | Homomorphic encryption | Smart grid | Smart meter
Journal Article
Proceedings on Privacy Enhancing Technologies, ISSN 2299-0984, 01/2019, Volume 2019, Issue 1, pp. 87 - 107
.... In this paper, we rely on a structured methodology to contextualize and provide a critical analysis of the current knowledge on privacy-enhancing technologies used for testing, storing, and sharing... 
genome privacy | privacy enhancing technologies | systematization of knowledge
Journal Article
10/2018, ISBN 9783319917900, 457
This book presents the proceedings of SICC 2017, a conference devoted to promoting the dissemination of the different methodologies, techniques, theories, strategies, technologies and best practices... 
Physics | Systems and Data Security | Effects of Radiation/Radiation Protection | Security Science and Technology | Security | Safety in Chemistry, Dangerous Goods
eBook
Artificial Intelligence and Law, ISSN 0924-8463, 6/2014, Volume 22, Issue 2, pp. 113 - 139
Journal Article
IEEE Transactions on Vehicular Technology, ISSN 0018-9545, 09/2017, Volume 66, Issue 9, pp. 8139 - 8151
Journal Article
Proceedings on Privacy Enhancing Technologies, ISSN 2299-0984, 01/2020, Volume 2020, Issue 1, pp. 83 - 102
... (42%; 37) have ever used VPNs primarily as a privacy-enhancing technology. Of these, 18% (7) abandoned using VPNs while 81... 
privacy | psychology | privacy-enhancing technologies | Virtual Private Networks (VPNs) | judgment and decision making | virtual private networks (vpns)
Journal Article
No results were found for your search.

Cannot display more than 1000 results, please narrow the terms of your search.