Privacy-enhancing technologies (PET) are technologies that embody fundamental data protection principles by minimizing personal data use, maximizing data... 27 KB (3,181 words) - 17:39, 4 April 2024 |
service Privacy engineering Privacy-enhancing technologies Surveillance capitalism User interface design Hes, R. "Privacy Enhancing Technologies: the path... 39 KB (3,998 words) - 19:26, 22 January 2024 |
03868 [cs.CR]. "Privacy-enhancing technologies (PETs)" (PDF). Draft anonymisation, pseudonymisation and privacy-enhancing technologies guidance. Information... 45 KB (4,300 words) - 14:31, 16 February 2024 |
timely fashion. A privacy-enhancing technology (PET) is a method of protecting data. PETs allow online users to protect the privacy of their personally... 9 KB (946 words) - 19:30, 15 January 2024 |
Information privacy Internet privacy Encryption Privacy Proxy server Metadata removal tool Privacy engineering Privacy-enhancing technologies GNU Privacy Guard... 5 KB (576 words) - 00:13, 26 December 2023 |
Spy pixel (category Privacy of telecommunications) Experiments on Ad Privacy Settings.” Proceedings on Privacy Enhancing Technologies 2015(1):92–112. Taylor, Curtis R. 2004. “Consumer Privacy and the Market... 25 KB (3,237 words) - 18:37, 12 April 2024 |
Trustworthy AI (category Information privacy) of Privacy-enhancing technologies (PETs), including homomorphic encryption, federated learning, secure multi-party computation, differential privacy, zero-knowledge... 6 KB (526 words) - 21:57, 16 January 2024 |
self-determination ePrivacy Regulation Genetic privacy Pirate Party Privacy Privacy by design Privacy enhancing technologies Privacy law Privacy software Web... 36 KB (4,025 words) - 05:01, 29 March 2024 |
Monero (category Privacy) Abbreviation: XMR) is a cryptocurrency which uses a blockchain with privacy-enhancing technologies to obfuscate transactions to achieve anonymity and fungibility... 34 KB (2,993 words) - 23:49, 14 April 2024 |
Venmo (section Social component and privacy) what you did on Venmo: Discovering privacy leaks in mobile social payments" (PDF). Privacy Enhancing Technologies. Retrieved March 11, 2022. McCaffrey... 32 KB (3,304 words) - 20:38, 12 April 2024 |
Websites Using Traffic Analysis". Privacy Enhancing Technologies. International Workshop on Privacy Enhancing Technologies. Lecture Notes in Computer Science... 23 KB (3,307 words) - 18:11, 14 February 2024 |
aiming to be "bug for bug compatible". In 2018, a paper on privacy-enhancing technologies by Florentin Rochet and Olivier Pereira showed how to exploit... 6 KB (638 words) - 20:53, 2 April 2024 |
Hal Finney (computer scientist) (category California Institute of Technology alumni) demonstrated Finney's commitment to privacy and his significant contributions to the development of privacy-enhancing technologies. In 2004, Finney created the... 14 KB (1,249 words) - 20:49, 15 April 2024 |
Evercookie (category Internet privacy software) Tracking Data in the Online Advertising Ecosystem". Proceedings on Privacy Enhancing Technologies. 2018 (4): 85–103. doi:10.1515/popets-2018-0033. ISSN 2299-0984... 23 KB (2,600 words) - 06:01, 18 January 2024 |
Lantern (software) (section Privacy policy) domain fronting". Proceedings on Privacy Enhancing Technologies. 2015 (2). Proceedings on Privacy Enhancing Technologies 2015: 46–64. doi:10.1515/popets-2015-0009... 10 KB (964 words) - 19:42, 6 February 2024 |
the growing focus on internet privacy, there are technologies and programs designed to enhance and encourage more privacy setting activity. Applications... 37 KB (4,484 words) - 13:35, 21 January 2024 |
Tor (network) (category Internet privacy software) Douglas (2008). "Privacy Enhancing Technologies" (PDF). Proceedings of the 8th International Symposium on Privacy Enhancing Technologies. 8th International... 188 KB (16,160 words) - 03:05, 23 April 2024 |
In: Proceedings of the International Workshop on Designing Privacy Enhancing Technologies: Design Issues in Anonymity and Unobservability. New York, NY:... 55 KB (6,112 words) - 15:28, 6 April 2024 |
Cross-device tracking (redirect from Privacy concerns with cross-device tracking) Mavroudis; et al. "On the Privacy and Security of the Ultrasound Ecosystem" (PDF). ubeacsec.org. Proceedings on Privacy Enhancing Technologies. Retrieved 30 November... 35 KB (4,465 words) - 23:03, 21 April 2024 |
Dark pattern (category Technology neologisms) "Tales from the Dark Side: Privacy Dark Strategies and Privacy Dark Patterns". Proceedings on Privacy Enhancing Technologies. 2016 (4): 237–254. doi:10... 25 KB (2,603 words) - 18:09, 25 February 2024 |
cypherspace.org. Salomon, David (2003). "Secure Programming with Perl". Data Privacy and Security. Springer. p. 200. ISBN 9781441918161. Judmayer, Aljosha;... 11 KB (827 words) - 05:23, 5 April 2024 |
the University of Waterloo, and the Canada Research Chair in Privacy Enhancing Technologies. He was formerly Tor Project board of directors chairman, and... 11 KB (824 words) - 17:50, 26 January 2024 |
Quad9 (section Security and privacy) Nick (2019). "Oblivious DNS: Practical Privacy for DNS Queries". Proceedings on Privacy Enhancing Technologies. 2019 (2): 228–244. arXiv:1806.00276. doi:10... 27 KB (2,941 words) - 20:11, 29 December 2023 |
He is known for his work on formal methods, cryptography and privacy-enhancing technologies. Born in Germany, he received a diploma degree in computer science... 8 KB (460 words) - 04:49, 3 March 2024 |
Sustainable Development Goal indicators ... UNSD leads the Privacy-Enhancing Technologies Lab (PET Lab), which in turn drives TrustworthyAI together with... 5 KB (408 words) - 17:04, 29 November 2023 |
Feamster, Nick (2019). "Oblivious DNS: Practical Privacy for DNS Queries" (PDF). Privacy Enhancing Technologies. 2019 (2): 228–244. arXiv:1806.00276. doi:10... 70 KB (9,091 words) - 09:33, 20 April 2024 |