Filters








77 Hits in 7.3 sec

Privacy-preserving Targeted Advertising Scheme for IPTV using the Cloud
english

2012 Proceedings of the International Conference on Security and Cryptography   unpublished
In this paper, we present a privacy-preserving scheme for targeted advertising via the Internet Protocol TV (IPTV).  ...  The scheme uses a communication model involving a collection of viewers/subscribers, a content provider (IPTV), an advertiser, and a cloud server.  ...  CONCLUSION AND FUTURE WORK We propose a practical solution for secure and privacy-preserving targeted advertising service for IPTV subscribers utilizing cloud computing.  ... 
doi:10.5220/0004021900740083 fatcat:6qlthd3cfvfqdmq7w246x4aaia

A practical privacy-preserving targeted advertising scheme for IPTV users

Leyli Javid Khayati, Cengiz Orencik, Erkay Savas, Berkant Ustaoglu
2015 International Journal of Information Security  
In this work, we present a privacy-preserving scheme for targeted advertising via the Internet Protocol TV (IPTV).  ...  The scheme uses a communication model involving a collection of subscribers, a content provider (IPTV), advertisers and a semi-trusted server.  ...  Theorem 5 The privacy-preserving targeted advertising scheme is privacy-preserving in accordance with Definition 10.  ... 
doi:10.1007/s10207-015-0296-7 fatcat:hhkjlvf7vzhhplclak4vpj2xyu

Survey on Multi-Access Edge Computing Security and Privacy

Pasika Ranaweera, Anca Delia Jurcut, Madhusanka Liyanage
2021 IEEE Communications Surveys and Tutorials  
The proposed method targets privacy preservation of deep learning classification tasks employed in mobile offloading processes.  ...  was enforced on the 25th of May 2018; it is an initiative taken for strengthening citizens' fundamental rights in the digital age for securing private data and preserving the privacy of individuals using  ... 
doi:10.1109/comst.2021.3062546 fatcat:u3xxvixiw5a4fdl2wxdla24ocu

A Fog Based Middleware for Automated Compliance With OECD Privacy Principles in Internet of Healthcare Things

Ahmed M. Elmisery, Seungmin Rho, Dmitri Botvich
2016 IEEE Access  
In this paper, we assert that utilizing the cloud-based healthcare services to generate accurate health insights are feasible, while preserving the privacy of the end-users' sensitive health information  ...  We depicted how the proposed approach can be integrated into a scenario related to preserving the privacy of the users' health data that is utilized by a cloud-based healthcare recommender service in order  ...  the precision of target marketing by advertising various medical services, healthcare related devices and local business based on the predicated recommendations. 2) CLOUD-BASED HEALTHCARE SERVICES RESTRICTIONS  ... 
doi:10.1109/access.2016.2631546 fatcat:xordqsl2t5hfrbxqhipzjcets4

The Impact of Next Generation Television on Consumers and the First Amendment

Rob Frieden
2013 Social Science Research Network  
The paper identifies the need for significant amendment of the Communications Act of 1934 to provide a light-handed and limited, but explicit statutory basis for the FCC to resolve predictable disputes  ...  This paper will examine the ongoing migration from channels to software-configured platforms for accessing video content with an eye toward assessing the impact on consumers and the First Amendment.  ...  : Cloud Computing Privacy Under The Stored Communications Act, 98 GEO. L.J. 1195, 1199 (2010) ("The increasing functionality of the Internet is decreasing the role of the personal computer.  ... 
doi:10.2139/ssrn.2261327 fatcat:ufgqcf7srbfz3ivl2vne47hclu

Net Bias and the Treatment of 'Mission-Critical' Bits

Rob Frieden
2014 Social Science Research Network  
: Cloud Computing Privacy Under The Stored Communications Act, 98 GEO. L.J. 1195, 1199 (April, 2010). See. e.g., Daniel L.  ...  Newspapers derive their revenues from both subscribers and advertisers; thus, the prices that newspapers set for subscribers and the prices they set for advertising space must be calibrated due to the  ... 
doi:10.2139/ssrn.2422842 fatcat:bbbqm6pmkvdadnt5bhmhbjwuce

Net Bias and the Treatment of 'Mission-Critical' Bits

Rob Frieden
2014 Social Science Research Network  
: Cloud Computing Privacy Under The Stored Communications Act, 98 GEO. L.J. 1195, 1199 (April, 2010). See. e.g., Daniel L.  ...  Newspapers derive their revenues from both subscribers and advertisers; thus, the prices that newspapers set for subscribers and the prices they set for advertising space must be calibrated due to the  ... 
doi:10.2139/ssrn.2414149 fatcat:var4tdmb2vaiti5g4qu236stdm

2020 Index IEEE Transactions on Vehicular Technology Vol. 69

2020 IEEE Transactions on Vehicular Technology  
+ Check author entry for coauthors ami-mFading Channels With Integer and Non-Integerm; TVT March 2020 2785-2801 Hoang, T.M., Tran, X.N., Nguyen, B.C., and Dung, L.T., On the Performance of MIMO Full-Duplex  ...  in VANETs; TVT Dec. 2020 15933-15946 Hoseini, S.A., Ding, M., Hassan, M., and Chen, Y., Analyzing the Impact of Molecular Re-Radiation on the MIMO Capacity in High-Frequency Bands; TVT Dec. 2020 15458  ...  ., +, TVT May 2020 5535-5548 Privacy-Preserving Authentication Scheme for Connected Electric Vehicles Using Blockchain and Zero Knowledge Proofs.  ... 
doi:10.1109/tvt.2021.3055470 fatcat:536l4pgnufhixneoa3a3dibdma

Community Networks and Sustainability: a Survey of Perceptions, Practices, and Proposed Solutions [article]

Panagiota Micholia, Merkouris Karaliopoulos, Iordanis Koutsopoulos, Leandro Navarro, Roger Baig, Dimitris Boucas, Maria Michalis, Panayiotis Antoniadis
2017 arXiv   pre-print
ground for CN participation.  ...  Finally, we iterate and discuss theoretical concepts of incentive mechanisms that have been proposed in the literature for these networks as well as implemented tools and processes designed to set the  ...  The authors acknowledge the support of the European Commission through the Horizon 2020 project netCommons (Contract number 688768, duration 2016-2018).  ... 
arXiv:1707.06898v1 fatcat:6iocpq3jofeuvmvemxgh7zxhyy

The Rise of Quasi-Common Carriers and Conduit Convergence

Rob Frieden
2013 Social Science Research Network  
for limited or no regulation.  ...  However such flexibility generates regulatory uncertainty and the potential for the Commission to exceed its statutory authority.  ...  : Cloud Computing Privacy Under The Stored Communications Act, 98 GEO.  ... 
doi:10.2139/ssrn.2261346 fatcat:l3ea4qqjzvgbxhsjliwlfsh3nm

Net neutrality - How relevant is it to Australia?

James Endres
2009 Telecommunications Journal of Australia  
ACKNOWLEDGEMENTS Portions of this essay come from earlier testimony before the U.S. Congress. I would like to thank Derek Slater, Carolyn Dalton, and Rick Whitt at Google for their assistance.  ...  ACKNOWLEDGEMENTS The authors benefited from generous assistance from colleagues and interns including Alana Maurushat, Reg Leones, Adam Arnold and Joanna Chow.  ...  for false advertising, and $1500 per subscriber for alleged privacy violations.  ... 
doi:10.2104/tja09022 fatcat:iyhfeahrmverdoaskclswtokx4

About the authors

2009 Telecommunications Journal of Australia  
ACKNOWLEDGEMENTS Thanks to anonymous referees for extremely helpful comments on an earlier version of this article. REFERENCES  ...  GUARDING SECURITY, PRIVACY, AND FAIR USE SAFETY FROM ATTACKS ON PRIVACY AND E-SECURITY Security and privacy is eroding through the use of communications technologies, and Australia's laws do not sufficiently  ...  IPTV France is widely regarded as the most advanced IPTV market in the OECD, with Free as a major driver of innovation.  ... 
doi:10.2104/tja09038 fatcat:uztdg56gjrhytfacazjvrkhwdu

5GZORRO_D.2.1. Use Cases and Requirements Definition

Adriana Fernandez August Betzler
2021 Zenodo  
Multiple scenarios are covered for each use case, in order to illustrate the behaviour expected using the 5GZORRO platform and identify various ways for stakeholders to interact among themselves.  ...  Three Use Cases are proposed in 5GZORRO: Smart Contracts for Ubiquitous Computing/Connectivity: It covers mechanisms for the implementation of DLT-anchored Smart Contracts and Oracles with the objective  ...  schemes declared. • Service composed by the CSP using different VNF providers.  ... 
doi:10.5281/zenodo.5211350 fatcat:khbocyw5uzektiukzzcwj7dsyy

Program

2020 2020 IEEE International Conference on Consumer Electronics - Taiwan (ICCE-Taiwan)  
In the era of cloud computing with security, how to outsource a trained model to the server but preserve the model privacy is a significant problem for decision tree classification (DTC).  ...  The main technique to preserve privacy is to build secret sharing-based protocols for the model owner, user, and server.  ...  Privacy-preserving Distributed Data Integration (PDDI) is one of the encryption techniques to match and integrate medical records held in multiple organizations while preserving privacy.  ... 
doi:10.1109/icce-taiwan49838.2020.9258230 fatcat:g25vw7mzvradxna2grlzp6kgiq

The Human Face of Mobile [chapter]

Hajar Mousannif, Ismail Khalil
2014 Lecture Notes in Computer Science  
Section 3 reviews some related work in the area of emotion recognition using mobile technology.  ...  around the user, and 5°) Multimodal emotion recognition where many communication channels or modalities are used.  ...  We will work on making EgoGenie smarter while preserving the privacy and the autonomy of the psychic life of the user.  ... 
doi:10.1007/978-3-642-55032-4_1 fatcat:lp5ccbakg5ayrdihfqy5asalve
« Previous Showing results 1 — 15 out of 77 results