• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 283
  • 55
  • 51
  • 25
  • 19
  • 18
  • 17
  • 10
  • 7
  • 7
  • 5
  • 5
  • 4
  • 4
  • 4
  • Tagged with
  • 586
  • 586
  • 233
  • 227
  • 183
  • 149
  • 105
  • 95
  • 81
  • 77
  • 75
  • 74
  • 71
  • 68
  • 68
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
361

Contributions to secure and privacy-preserving use of electronic credentials

Shahandashti, Siamak Fayyaz. January 2009 (has links)
Thesis (Ph.D.)--University of Wollongong, 2009. / Typescript. Includes bibliographical references (leaf 130-140) and index.
362

Datenaustausch zwischen Arbeitgeber und Versicherung : Probleme der Bearbeitung von Gesundheitsdaten der Arbeitnehmer bei der Begründung des privatrechtlichen Arbeitsverhältnisses /

Pärli, Kurt. January 2003 (has links)
Thesis (doctoral)--Universität St. Gallen, 2003. / Includes bibliographical references (p. xxxiii-l).
363

Privatumo ir asmens duomenų apsaugos reguliavimas tarptautiniu mastu / Regulation of privacy and data protection in International level

Kalinauskas, Marius 04 February 2009 (has links)
Darbe nagrinėjami privatumo bei asmens duomenų apsaugos probleminiai aspektai tarptautiniu mastu. Apibūdinti šia vertybę yra išties nelengva, kadangi joje persipynę daugybė skirtingų, bet tarpusavyje susietų kategorijų. Nepaisant to, privatumas priskirtinas prie svarbiausių žmogaus teisių bei laisvių ir yra gerbtinas bei saugotinas. Šio darbo tikslas – pažvelgti į dabar esantį tarptautinį teisinį reguliavimą privatumo bei asmens duomenų apsaugos srityje, atskleisti bei aptarti grėsmes privatumui XXI a. pradžioje bei atsakyti į klausimą: ar dabartinis privatumo bei asmens duomenų apsaugos reguliavimas atitinka šiandienos technologines, socialines bei ekonomines realijas. Magistriniame darbe keliama hipotezė, jog privatumo bei asmens duomenų apsaugos reguliavimas nėra pakankamas, todėl jį būtina iš naujo peržiūrėti bei papildyti. Autorius išsako nuomonę, jog pasaulis yra per daug skirtingas ir kad vieningo bei efektyvaus teisės akto priėmimas šiomis aplinkybėmis tampa sunkiai įmanomu. Darbe aptariamas tarptautinis bei regioninis privatumo bei asmens duomenų apsaugos reglamentavimas, supažindinama su galimais pažeidimais šioje srityje, keliami probleminiai klausimai dėl atskirų šios teisės apsaugos reguliavimo aspektų bei pateikiami pasiūlymai dėl efektyvesnio iškilusių problemų sprendimo. Iškeltam tikslui bei iš jo sekantiems uždaviniams įgyvendinti naudojami lingvistinis, loginis, lyginamasis, sisteminės analizės bei kiti tyrimo metodai. Darbą sudaro keturi skyriai, kuriuose... [toliau žr. visą tekstą] / The main research issue of this master thesis is problem-oriented approach of privacy and data protection regulation in international level. It’s hard to conceptualize privacy as a value, because it’s very complex ant closely intertwined with other categories of similar topic. Nevertheless, privacy is numbered as one of the fundamental human rights and should be treated with respect and under great protection. The main objective of the final paper is to overlook today’s legal basis of international law norms concerning privacy and data protection. Also, to reveal and discuss main threats to mentioned value at the beginning of XXI century and answer the question: is nowadays regulation of privacy and data protection in international level deals with challenges of technological, social and economical reality. In this final paper author comes with the hypothesis that privacy and data protection regulation is ineffective in international level. Legal acts must be revised and supplemented with new norms which should be up to date considering nowadays reality. It is also noted that differences of various countries are huge and effective new generation privacy and data protection regulation is more like a utopia. Some problematic aspects are discussed in master’s thesis concerning privacy violations, legal norm regulation effectiveness and possible ways of solving these problems. In order to achieve goals of objective, author uses scientific methods for his research. These methods... [to full text]
364

Unrealization approaches for privacy preserving data mining

Williams, James 08 December 2010 (has links)
This thesis contains a critical evaluation of the unrealization approach to privacy preserving data mining. We cover a fair bit of ground, making numerous contributions to the existing literature. First, we present a comprehensive and accurate analysis of the challenges posed by data mining to privacy. Second, we put the unrealization approach on firmer ground by providing proofs of previously unproven claims, using the multi-relational algebra. Third, we extend the unrealization approach to the C4.5 algorithm. Fourth, we evaluate the algorithm's space requirements on three representative data sets. Lastly, we analyse the unrealization approach against various issues identified in the first contribution. Our conclusion is that the unrealization approach to privacy preserving data mining is novel, and capable of addressing some of the major challenges posed by data mining to privacy. Unfortunately, its space and time requirements vitiate its applicability on real-world data sets.
365

Architectural support for improving security and performance of memory sub-systems

Yan, Chenyu 17 November 2008 (has links)
This thesis explores architectural level optimizations to make secure systems more efficient, secure and affordable. It extends prior work for secure architecture in several areas. It proposes a new combined memory encryption and authentication scheme which uses very small on-chip storage area and incurs much less performance overhead compared with prior work. In addition, the thesis studies the issues of applying architectural support for data security to distributed shared memory systems. It presents a scheme which is scalable with large-scale systems and only introduces negligible performance overhead for confidentiality and integrity protection. Furthermore, the thesis also investigates another source of reducing performance overhead in secure systems through optimizing on-chip caching schemes and minimizing off-chip communications.
366

Securing wireless networks against eavesdropping using smart antennas

Lakshmanan, Sriram 29 October 2007 (has links)
In this work, we focus on securing communication over wireless data networks from malicious eavesdroppers, using smart antennas. While conventional cryptography based approaches focus on hiding the meaning of the information being communicated from the eavesdropper, we consider a complimentary class of strategies that limit knowledge of the existence of the information from the eavesdropper. We profile the performance achievable using simple beamforming strategies using a newly defined metric called exposure region. We then present three strategies within the context of an approach called 'virtual arrays of physical arrays' to significantly improve the exposure region performance of a wireless LAN environment. Using simulations, analysis, and field experiments, we validate and evaluate the proposed strategies.
367

Robust digital watermarking of multimedia objects

Gupta, Gaurav January 2008 (has links)
Thesis (PhD)--Macquarie University, Division of Information and Communication Sciences, Department of Computing, 2008. / Bibliography: p. 144-153. / Introduction -- Background -- Overview of watermarking -- Natural language watermarking -- Software watermarking -- Semi-blind and reversible database watermarking -- Blind and reversible database watermarking -- Conclusion and future research -- Bibliography. / Digital watermarking has generated significant research and commercial interest in the past decade. The primary factors contributing to this surge are widespread use of the Internet with improved bandwidth and speed, regional copyright loopholes in terms of legislation; and seamless distribution of multimedia content due to peer-to-peer file-sharing applications. -- Digital watermarking addresses the issue of establishing ownership over mul-timedia content through embedding a watermark inside the object. Ideally, this watermark should be detectable and/or extractable, survive attacks such as digital reproduction and content-specific manipulations such as re-sizing in the case of images, and be invisible to the end-user so that the quality of the content is not degraded significantly. During detection or extraction, the only requirements should be the secret key and the watermarked multimedia object, and not the original un-marked object or the watermark inserted. Watermarking scheme that facilitate this requirement are categorized as blind. In recent times, reversibility of watermark has also become an important criterion. This is due to the fact that reversible watermarking schemes can provided security against secondary watermarking attacks by using backtracking algorithms to identify the rightful owner. A watermarking scheme is said to be reversible if the original unmarked object can be regenerated from the watermarked copy and the secret key. / This research covers three multimedia content types: natural language documents, software, and databases; and discusses the current watermarking scenario, challenges, and our contribution to the field. We have designed and implemented a natural language watermarking scheme that uses the redundancies in natural languages. As a result, it is robust against general attacks against text watermarks. It offers additional strength to the scheme by localizing the attack to the modified section and using error correction codes to detect the watermark. Our first contribution in software watermarking is identification and exploitation of weaknesses in branch-based software watermarking scheme proposed in [71] and the software watermarking algorithm we present is an improvised version of the existing watermarking schemes from [71]. Our scheme survives automated debugging attacks against which the current schemes are vulnerable, and is also secure against other software-specific attacks. We have proposed two database watermarking schemes that are both reversible and therefore resilient against secondary watermarking attacks. The first of these database watermarking schemes is semi-blind and requires the bits modified during the insertion algorithm to detect the watermark. The second scheme is an upgraded version that is blind and therefore does not require anything except a secret key and the watermarked relation. The watermark has a 89% probability of survival even when almost half of the data is manipulated. The watermarked data in this case is extremely useful from the users' perspective, since query results are preserved (i.e., the watermarked data gives the same results for a query as the nmarked data). -- The watermarking models we have proposed provide greater security against sophisticated attacks in different domains while providing sufficient watermark-carrying capacity at the same time. The false-positives are extremely low in all the models, thereby making accidental detection of watermark in a random object almost negligible. Reversibility has been facilitated in the later watermarking algorithms and is a solution to the secondary watermarking attacks. We shall address reversibility as a key issue in our future research, along with robustness, low false-positives and high capacity. / Mode of access: World Wide Web. / xxiv, 156 p. ill. (some col.)
368

Datenschutzrechtliche Fragen des SCHUFA-Auskunftsverfahrens unter besonderer Berücksichtigung des sogenannten "Scorings"

Becker, Ina January 2006 (has links)
Zugl.: Hannover, Univ., Diss., 2006
369

Contributions to privacy preserving with ring signatures

Chen, YiQun. January 2006 (has links)
Thesis (M.Comp.Sc.)--University of Wollongong, 2006. / Typescript. Includes bibliographical references: leaf 66-72.
370

Contributions to security in wireless ad-hoc networks

Ng, Ching Yu. January 2005 (has links)
Thesis (M.Comp.Sc.)--University of Wollongong, 2005. / Typescript. This thesis is subject to a 6 month embargo (12/12/05 to 12/06/06) and may only be viewed and copied with the permission of the author. For further information please Contact the Archivist. Includes bibliographical references: leaf 65-72.

Page generated in 0.4929 seconds