Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,179,887 papers from all fields of science
Search
Sign In
Create Free Account
Privacy
Known as:
Right Of Privacy
, Privacy right
, Personal privacy
Expand
Privacy is the ability of an individual or group to seclude themselves, or information about themselves, and thereby express themselves selectively…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Activity tracker
American Libraries
Business process interoperability
CUPS (CMU)
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2010
Review
2010
Friends only: examining a privacy-enhancing behavior in facebook
F. Stutzman
,
Jacob Kramer-Duffield
International Conference on Human Factors in…
2010
Corpus ID: 9434373
Privacy practices in social network sites often appear paradoxical, as content-sharing behavior stands in conflict with the need…
Expand
Highly Cited
2009
Highly Cited
2009
Patient controlled encryption: ensuring privacy of electronic medical records
Josh Benaloh
,
Melissa Chase
,
E. Horvitz
,
K. Lauter
Cloud Computing Security Workshop
2009
Corpus ID: 640083
We explore the challenge of preserving patients' privacy in electronic health record systems. We argue that security in such…
Expand
Highly Cited
2008
Highly Cited
2008
PAD: privacy-area aware, dummy-based location privacy in mobile services
Hua Lu
,
Christian S. Jensen
,
Man Lung Yiu
ACM International Workshop on Data Engineering…
2008
Corpus ID: 14379360
Location privacy in mobile services has the potential to become a serious concern for service providers and users. Existing…
Expand
Highly Cited
2007
Highly Cited
2007
Location Privacy Protection Through Obfuscation-Based Techniques
C. Ardagna
,
M. Cremonini
,
E. Damiani
,
S. Vimercati
,
P. Samarati
Database Security
2007
Corpus ID: 6998918
The widespread adoption of mobile communication devices combined with technical improvements of location technologies are…
Expand
Highly Cited
2005
Highly Cited
2005
Protecting Privacy Against Location-Based Personal Identification
C. Bettini
,
X. Wang
,
S. Jajodia
Secure Data Management
2005
Corpus ID: 14210673
This paper presents a preliminary investigation on the privacy issues involved in the use of location-based services. It is…
Expand
Highly Cited
2003
Highly Cited
2003
Biometric Recognition: Security and Privacy Concerns
S. Prabhakar
,
Sharath Pankanti
,
Anil K. Jain
IEEE Security and Privacy
2003
Corpus ID: 42555085
Biometrics offers greater security and convenience than traditional methods of personal recognition. In some applications…
Expand
Highly Cited
2003
Highly Cited
2003
Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems
Stephen A. Weis
,
S. Sarma
,
R. Rivest
,
D. Engels
International Conference on Security in Pervasive…
2003
Corpus ID: 8244823
Like many technologies, low-cost Radio Frequency Identification (RFID) systems will become pervasive in our daily lives when…
Expand
Highly Cited
2000
Highly Cited
2000
The effects of filtered video on awareness and privacy
Michael Boyle
,
Christopher Edwards
,
S. Greenberg
Conference on Computer Supported Cooperative Work
2000
Corpus ID: 1539523
Video-based media spaces are designed to support casual interaction between intimate collaborators. Yet transmitting video is…
Expand
Highly Cited
1999
Highly Cited
1999
Privacy preserving auctions and mechanism design
M. Naor
,
Benny Pinkas
,
Reuban Sumner
ACM Conference on Economics and Computation
1999
Corpus ID: 207593367
We suggest an architecture for executing protocols for auctions and, more generally, mechanism design. Our goal is to preserve…
Expand
Highly Cited
1993
Highly Cited
1993
Markets and privacy
K. Laudon
CACM
1993
Corpus ID: 15871610
Since the 1960s privacy advocates have relied on regulatory and legislativeapproaches to privacy protection in the United States…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE