Home > Research > Browse

Results for Privacy

Activities

  1. Computers, Privacy & Data Protection (CPDP), 7th International Conference: Reforming Data Protection: The Global Perspective

    Kristrun Gunnarsdottir (Invited speaker)
    21/01/201423/01/2014

    Activity: Participating in or organising an event typesParticipation in conference

  2. 4S Annual Meeting 2013

    Kristrun Gunnarsdottir (Speaker)
    9/10/201312/10/2013

    Activity: Participating in or organising an event typesParticipation in conference

  3. “Smart" implants: therapeutic solutions, security and human enhancement

    Kristrun Gunnarsdottir (Organiser)
    20/10/2012

    Activity: Participating in or organising an event typesParticipation in workshop, seminar, course

  4. Challenges of ICT for Public Policy

    Kristrun Gunnarsdottir (Member of programme committee)
    23/03/2011

    Activity: Participating in or organising an event typesParticipation in workshop, seminar, course

Publications & Outputs

  1. Experiencing the Future Mundane

    Coulton, P., Lindley, J. G., Gradinar, A. I., Colley, J., Sailaja, N., Crabtree, A., Forrester, I. & Kerlin, L., 11/04/2019, Proceedings of RTD 2019. 16 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  2. Usable assured deletion in the cloud

    Ramokapane, K. M., 2019, Lancaster University. 190 p.

    Research output: ThesisDoctoral Thesis

  3. Private Collaborative Business Benchmarking in the Cloud

    Sobati-Moghadam, S. & Fayoumi, A., 2/11/2018, Intelligent Computing: SAI 2018. Arai, K., Kapoor, S. & Bhatia, R. (eds.). Cham: Springer, p. 1359-1365 7 p. (Advances in Intelligent Systems and Computing; vol. 857).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  4. A Distributed Locality-Sensitive Hashing-Based Approach for Cloud Service Recommendation From Multi-Source Data

    Qi, L., Zhang, X., Dou, W. & Ni, Q., 11/2017, In : IEEE Journal on Selected Areas in Communications. 35, 11, p. 2616-2624 9 p.

    Research output: Contribution to journalJournal article

  5. Auditing for privacy in threshold PKE e-voting

    Kiayias, A., Zacharias, T. & Zhang, B., 1/03/2017, In : Information and Computer Security. 25, 1, p. 100-116 17 p.

    Research output: Contribution to journalJournal article

  6. Analysing the role of privacy impact assessments in technological development for crisis management

    Easton, C. R., 03/2017, In : Journal of Contingencies and Crisis Management. 25, 1, p. 7-14 8 p.

    Research output: Contribution to journalJournal article

  7. Consent and confidentiality in the light of recent demands for data sharing

    Williams, G. D. & Pigeot, I., 03/2017, In : Biometrical Journal. 59, 2, p. 240-250 11 p.

    Research output: Contribution to journalJournal article

  8. A privacy preserving approach to energy theft detection in smart grids

    Richardson, C., Race, N. & Smith, P., 1/09/2016, 2016 IEEE International Smart Cities Conference (ISC2). IEEE, p. 1-4 4 p. (Smart Cities Conference (ISC2), 2016 IEEE International).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  9. Resolving multi-party privacy conflicts in social media

    Such, J. M. & Criado Pacheco, N., 2/06/2016, In : IEEE Transactions on Knowledge and Data Engineering. 28, 7, p. 1851-1863 13 p.

    Research output: Contribution to journalJournal article

  10. Implicit contextual integrity in online social networks

    Criado, N. & Such, J. M., 20/12/2015, In : Information Sciences. 325, p. 48-69 22 p.

    Research output: Contribution to journalJournal article

More results »