Conferences related to Internet Privacy

Back to Top

2020 IEEE Symposium on Security and Privacy (SP)

Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2021 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2019 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2018 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2017 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for the presentation of developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.Papers offer novel research contributions in any aspect of computer security or electronic privacy. Papers may represent advances in the theory, design, implementation, analysis, or empirical evaluation of secure systems, either for general use or for specific application domains.

  • 2016 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for the presentation of developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.Papers offer novel research contributions in any aspect of computer security or electronic privacy. Papers may represent advances in the theory, design, implementation, analysis, or empirical evaluation of secure systems, either for general use or for specific application domains.

  • 2015 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for the presentation of developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.Papers offer novel research contributions in any aspect of computer security or electronic privacy. Papers may represent advances in the theory, design, implementation, analysis, or empirical evaluation of secure systems, either for general use or for specific application domains.

  • 2014 IEEE Symposium on Security and Privacy (SP)

    IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners.

  • 2013 IEEE Symposium on Security and Privacy (SP) Conference dates subject to change

    IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners.

  • 2012 IEEE Symposium on Security and Privacy (SP) Conference dates subject to change

    IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners.

  • 2011 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2010 IEEE Symposium on Security and Privacy (SP)

    S&P is interested in all aspects of computer security and privacy.

  • 2009 IEEE Symposium on Security and Privacy (SP)

    The IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2008 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2007 IEEE Symposium on Security and Privacy (SP)

    Research contributions in any aspect of computer security and electronic privacy including advances in the theory, design, implementation, analysis of empirical evaluation of secure systems.

  • 2006 IEEE Symposium on Security and Privacy (SP)

  • 2005 IEEE Symposium on Security and Privacy (SRSP)


IEEE INFOCOM 2020 - IEEE Conference on Computer Communications

IEEE INFOCOM solicits research papers describing significant and innovative researchcontributions to the field of computer and data communication networks. We invite submissionson a wide range of research topics, spanning both theoretical and systems research.


2019 21st International Conference on Advanced Communication Technology (ICACT)

With technically co-sponsored by IEEE ComSoc(Communications Society), IEEE ComSocCISTC(Communications & Information Security Technical Community), and IEEE ComSocONTC(Optical Networking Technical Community), the ICACT(International Conference onAdvanced Communications Technology) Conference has been providing an open forum forscholars, researchers, and engineers to the extensive exchange of information on newlyemerging technologies, standards, services, and applications in the area of the advancedcommunications technology. The conference official language is English. All the presentedpapers have been published in the Conference Proceedings, and posted on the ICACT Websiteand IEEE Xplore Digital Library since 2004. The honorable ICACT Out-Standing Paper Awardlist has been posted on the IEEE Xplore Digital Library also, and all the Out-Standing papersare subjected to the invited paper of the "ICACT Transactions on the Advanced Communications Technology" Journal issue by GIRI

  • 2018 20th International Conference on Advanced Communication Technology (ICACT)

    With technically co-sponsored by IEEE ComSoc(Communications Society), IEEE ComSoc CISTC(Communications & Information Security Technical Community), and IEEE ComSoc ONTC(Optical Networking Technical Community), the ICACT(International Conference on Advanced Communications Technology) Conference has been providing an open forum for scholars, researchers, and engineers to the extensive exchange of information on newly emerging technologies, standards, services, and applications in the area of the advanced communications technology. The conference official language is English. All the presented papers have been published in the Conference Proceedings, and posted on the ICACT Website and IEEE Xplore Digital Library since 2004. The honorable ICACT Out-Standing Paper Award list has been posted on the IEEE Xplore Digital Library also, and all the Out-Standing papers are subjected to the invited paper of the "ICACT Transactions on the Advanced Communications Technology" Journal issued by GIRI

  • 2017 19th International Conference on Advanced Communication Technology (ICACT)

    With technically co-sponsored by IEEE ComSoc(Communications Society), IEEE ComSoc CISTC(Communications & Information Security Technical Community), and IEEE ComSoc ONTC(Optical Networking Technical Community), the ICACT(International Conference on Advanced Communications Technology) Conference has been providing an open forum for scholars, researchers, and engineers to the extensive exchange of information on newly emerging technologies, standards, services, and applications in the area of the advanced communications technology. The conference official language is English. All the presented papers have been published in the Conference Proceedings, and posted on the ICACT Website and IEEE Xplore Digital Library since 2004. The honorable ICACT Out-Standing Paper Award list has been posted on the IEEE Xplore Digital Library also, and all the Out-Standing papers are subjected to the invited paper of the "ICACT Transactions on the Advanced Communications Technology" Journal issued by

  • 2016 18th International Conference on Advanced Communication Technology (ICACT)

    With technically co-sponsored by IEEE ComSoc(Communications Society), IEEE ComSoc CISTC(Communications & Information Security Technical Community), and IEEE ComSoc ONTC(Optical Networking Technical Community), the ICACT(International Conference on Advanced Communications Technology) Conference has been providing an open forum for scholars, researchers, and engineers to the extensive exchange of information on newly emerging technologies, standards, services, and applications in the area of the advanced communications technology. The conference official language is English. All the presented papers have been published in the Conference Proceedings, and posted on the ICACT Website and IEEE Xplore Digital Library since 2004. The honorable ICACT Out-Standing Paper Award list has been posted on the IEEE Xplore Digital Library also, and all the Out-Standing papers are subjected to the invited paper of the "ICACT Transactions on the Advanced Communications Technology" Journal issued by GiRI.

  • 2015 17th International Conference on Advanced Communication Technology (ICACT)

    With technically co-sponsored by IEEE ComSoc(Communications Society), IEEE ComSoc CISTC(Communications & Information Security Technical Community), and IEEE ComSoc ONTC(Optical Networking Technical Community), the ICACT(International Conference on Advanced Communications Technology) Conference has been providing an open forum for scholars, researchers, and engineers to the extensive exchange of information on newly emerging technologies, standards, services, and applications in the area of the advanced communications technology. The conference official language is English. All the presented papers have been published in the Conference Proceedings, and posted on the ICACT Website and IEEE Xplore Digital Library since 2004. The honorable ICACT Out-Standing Paper Award list has been posted on the IEEE Xplore Digital Library also, and all the Out-Standing papers are subjected to the invited paper of the "ICACT Transactions on the Advanced Communications Technology" Journal issued by GiRI.

  • 2014 16th International Conference on Advanced Communication Technology (ICACT)

    Technology, service, architecture, strategy, and policy in newly emerging system, standard, service, and variety of application on the area of telecommunications. ICACT 2014 provides an open forum for scholar, researcher, engineer, policy maker, network planner, and service provider in the advanced communication technologies.

  • 2013 15th International Conference on Advanced Communication Technology (ICACT)

    Technology, standard, service, architecture, strategy, and policy in newly emerging systems and a variety of applications in the area of communications. ICACT2013 provides an open forum for scholar, researcher, engineer, policy maker, network planner, and service provider in the advanced communications technologies.

  • 2012 14th International Conference on Advanced Communication Technology (ICACT)

    Technology, service, architecture, strategy, and policy in newly emerging systems, standards, service, and a variety of applications in the area of telecommunicatons. ICACT 2012 provides an open forum for scholars, researchers, engineers, policy makers, network planners, and service providers in the advanced communication technologies.

  • 2011 13th International Conference on Advanced Communication Technology (ICACT)

    International Conference on Advanced Communication Technology (ICACT) provides an open forum for researchers, engineers, policy, network planners, and service providers in the advanced communication technologies. Extensive exchange of information will be provided on newly emerging systems, standards, services, and variety of applications on the area of telecommunications.

  • 2010 12th International Conference on Advanced Communication Technology (ICACT)

    ICACT is an annual conference providing an open forum for researchers, engineers, network planners, and service providers in telecommunications. Extensive exchange of information will be provided on newly emerging systems, standards, services, and variety of applications in the area of telecommunications.

  • 2009 11th International Conference on Advanced Communication Technology (ICACT)

    ICACT is an annual conference providing an open forum for researchers, engineers, network planners, and service providers in telecommunications. Extensive exchange of information will be provided on newly emerging systems, standards, services, and variety of applications in the area of telecommunications.

  • 2008 10th International Conference Advanced Communication Technology (ICACT)

  • 2007 9th International Conference Advanced Communication Technology (ICACT)

  • 2006 8th International Conference Advanced Communication Technology (ICACT)

  • 2005 7th International Conference Advanced Communication Technology (ICACT)

  • 2004 6th International Conference Advanced Communication Technology (ICACT)


2019 22nd Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN)

The ICIN conference, established in 1989 and praised for the richness of its social networking, is also recognized for its continuous adaptation to emerging technical trends.2019 will be the year of first large-scale 5G trials world-wide, targeting early network introduction, preliminary experimentation of network intelligence and orchestration solutions, and moving towards commercial large scale introduction in the 2020 horizon.At ICIN 2019, the driving theme is “Network AI and Zero-Touch Communication Systems”: we focus on the challenges related to the integration of analytics and orchestration solutions, enablers and methods, into automatic and autonomic service delivery and network management and operations. The conference will foster presentation of novel approaches and technical solutions, as well as experimental validation and proof of concepts.

  • 2018 21st Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN)

    ICIN 2018 will be held 20-22 February 2018 at Orange Gardens premises near Paris, France. The ICIN conference, established in 1989 and praised for the richness of its social networking, is also recognized for its continuous adaptation to emerging technical trends.2018 will be the year of coordinated 5G deployment across all EU Member states, targeting early network introduction, and moving towards commercial large scale introduction by the end of 2020 at the latest.As the main theme for ICIN 2018, “5G Network Architecture and Solutions: are we ready?” will explore the maturity and gaps remaining for end-to-end and large scale 5G technologies deployment. The conference will foster presentation of novel approaches and technical solutions, as well as experimental validation and proof of concepts. In addition to this edition theme, ICIN 2018 will keep a wide range of topics of interest within the fields of Cloud, Internet, and Networks.

  • 2017 20th Conference on Innovations in Clouds, Internet and Networks (ICIN)

    Since 1989 the ICIN series of conferences has been bringing together leading telecom and internet experts from industry, universities and government worldwide. ICIN operates on a rigorous peer review process and has become the established industry forum for addressing intelligence in Information and Communications Technology (ICT). ICIN conferences are renowned for their debates on the impact of emerging technology, architecture and industry trends on intelligent communications services. ICIN has an enviable track record of identifying key technology and service trends – and analysing their impact on business models – before they become widely recognized.

  • 2015 18th International Conference on Intelligence in Next Generation Networks (ICIN)

    Since 1989 the ICIN conferences have been bringing together leading internet and telecom experts from industry, universities and government worldwide. Major service providers and manufacturers from the most active markets worldwide have consistently contributed and provided insight on the technical and strategic directions that the industry is taking. ICIN operates on a rigorous peer review process and has an enviable track record of identifying key technology and service trends

  • 2013 17th International Conference on Intelligence in Next Generation Networks (ICIN): Unlocking Value from the Networks

    The primary focus of ICIN 2013 is twofold, addressing both how to make networks smarter with a stream on the transformation of Telcos

  • 2012 16th International Conference on Intelligence in Next Generation Networks (ICIN): Realising the Power of the Network

    ICIN addresses challenges of design, deployment, delivery, and management of services and applications over different platforms and diverse networks from both technical and business perspectives. The primary focus of ICIN 2012 is voice, data or multimedia services for enterprises or consumers that make use of capabilities in the operator network.

  • 2011 15th International Conference on Intelligence in Next Generation Networks (ICIN): "From Bits to Data, from Pipes to Clouds"

    Software-driven, context-aware services delivered and composed in the cloud and on smart devices will continue to transform the user experience and the ICT industry landscape. ICIN 2011 will bring together technical and business innovators to share their insight and experience of the technology, service and business transformation ahead.

  • 2010 14th International Conference on Intelligence in Next Generation Networks (ICIN): "Weaving Applications Into the Network Fabric"

    ICIN is a forum covering telecoms and web services and service architectures from both technical and business perspectives. ICIN 2010 will focus on new applications formed by weaving together emerging network capabilities, computational power, network and customer data, and content in valuable new and different patterns.

  • 2009 13th International Conference on Intelligence in Next Generation Networks (ICIN): "Beyond the Bit Pipes"

    ICIN 2009 will highlight the future services, enablers and architectures that will drive the market for communications products and services in the emerging high speed IP environment. The focus of ICIN 2009 will be on new and emerging business models, technology and value chains based on communications networks and devices.


2019 IEEE 17th International Conference on Industrial Informatics (INDIN)

Industrial information technologies


More Conferences

Periodicals related to Internet Privacy

Back to Top

Communications Letters, IEEE

Covers topics in the scope of IEEE Transactions on Communications but in the form of very brief publication (maximum of 6column lengths, including all diagrams and tables.)


Communications Magazine, IEEE

IEEE Communications Magazine was the number three most-cited journal in telecommunications and the number eighteen cited journal in electrical and electronics engineering in 2004, according to the annual Journal Citation Report (2004 edition) published by the Institute for Scientific Information. Read more at http://www.ieee.org/products/citations.html. This magazine covers all areas of communications such as lightwave telecommunications, high-speed data communications, personal communications ...


Communications Surveys & Tutorials, IEEE

Each tutorial reviews currents communications topics in network management and computer and wireless communications. Available tutorials, which are 2.5 to 5 hours in length contains the original visuals and voice-over by the presenter. IEEE Communications Surveys & Tutorials features two distinct types of articles: original articles and reprints. The original articles are exclusively written for IEEE Communications Surveys & Tutorials ...


Computer

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed technical content that covers all aspects of computer science, computer engineering, technology, and applications. Computer is a resource that practitioners, researchers, and managers can rely on to provide timely information about current research developments, trends, best practices, and changes in the profession.


Computer Architecture Letters

Rigorously peer-reviewed forum for publishing early, high-impact results in the areas of uni- and multiprocessors computer systems, computer architecture workload characterization, performance evaluation and simulation techniques, and power-aware computing


More Periodicals

Most published Xplore authors for Internet Privacy

Back to Top

Xplore Articles related to Internet Privacy

Back to Top

The Internet: privacy, censorship, the first amendment, and transnational communications; what's at stake?

Technology-Based Re-Engineering Engineering Education Proceedings of Frontiers in Education FIE'96 26th Annual Conference, 1996

This paper examines some of the problems under debate concerning the Internet. Included in the discussion are concerns over privacy issues, obscenity, pornography, and child pornography, the protection of minors from undesirable material on the Internet, and who has ultimate responsibility for the content and regulation of the Internet. Legal issues are examined along with a brief discussion on current ...


Internet Privacy Database

2012 Fourth International Symposium on Information Science and Engineering, 2012

Internet privacy has become an overlooked yet essential part our everyday lives. At any given moment, while browsing a web page, your identity could be stolen leaving you in thousands of dollars in debt. The purpose of this paper is to aid the general public to become more aware of these issues and the laws pertaining to them. We propose ...


Internet Privacy in E-Commerce: Framework, Review, and Opportunities for Future Research

Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008), 2008

Increased Internet traffic and the sophistication of companies in tracking that traffic have made privacy a critical issue in electronic commerce (e-commerce). This has spawned a number of research works addressing Internet privacy from the perspectives of three main stakeholders - customers, companies and governments, as well as the interactions among them. The purpose of this paper is to analyze ...


Factor analysis of E-commerce usage basing on Internet privacy

2011 International Conference on E-Business and E-Government (ICEE), 2011

Usually consumers need to provide private information when using E-commerce service. While this special information is vulnerable to leak, resulting from Internet operators' deregulation or government's surveillance and the potential venture blocks the development of E-commerce. Basing on Internet consumers' concerns about privacy violation, this paper establishes a structural equation model of the factors of Ecommerce usage which is testified ...


Examining Internet privacy policies within the context of user privacy values

IEEE Transactions on Engineering Management, 2005

Internet privacy policies describe an organization's practices on data collection, use, and disclosure. These privacy policies both protect the organization and signal integrity commitment to site visitors. Consumers use the stated website policies to guide browsing and transaction decisions. This paper compares the classes of privacy protection goals (which express desired protection of consumer privacy rights) and vulnerabilities (which potentially ...


More Xplore Articles

Educational Resources on Internet Privacy

Back to Top

IEEE.tv Videos

Luca Bolognini: Internet of Things: Privacy and Security Challenges - WF-IoT 2015
IEEE Future Directions: What is the Internet of Things?
Designing Privacy Into Internet Protocols - Juan Carlos Zuniga keynote
Antonio Skarmeta: Security and Privacy in the Internet of Things - WF-IoT 2015
IEEE World Forum on Internet of Things - Milan, Italy - Sara Foresti - Data Security and Privacy in the Internet of Things - Part 1
IEEE World Forum on Internet of Things - Milan, Italy - Sara Foresti - Data Security and Privacy in the Internet of Things - Part 2
IEEE World Forum on Internet of Things - Milan, Italy - Sara Foresti - Data Security and Privacy in the Internet of Things - Part 3
IEEE Internet Initiative
Introductions: Experts in Technology and Policy (ETAP) Forum on Internet Governance, Cybersecurity and Privacy - February 2016
Juan Carlos Zuniga on Wi-Fi Privacy at IEEE 802 & IETF: 2016 End to End Trust and Security Workshop for the Internet of Things
Security and Privacy in a World of Connected Devices
IEEE Summit on Internet Governance 2014: Panel II - Security vs. Privacy
Panelist Limor Shmerling Magazanik - ETAP Forum Tel Aviv 2016
Keynote: Nitin Desai - ETAP Delhi 2016
Panel Discussion: RegionaI Issues and Developments Related to Internet Governance, Cybersecurity and Privacy - ETAP Tel Aviv 2015
Privacy, security, and innovation challenges in different aspects of IoT - Panel from ETAP Forum, February 2016
IEEE @ SXSW 2015 - Lessons from Africa: Relationships Over Privacy
Panelist: Chaim Cohen - ETAP Delhi 2016
Keynote Isaac Ben-Israel - ETAP Forum Tel Aviv 2016
Speaker Jessica Groopman - ETAP San Jose 2015

IEEE-USA E-Books

  • The Internet: privacy, censorship, the first amendment, and transnational communications; what's at stake?

    This paper examines some of the problems under debate concerning the Internet. Included in the discussion are concerns over privacy issues, obscenity, pornography, and child pornography, the protection of minors from undesirable material on the Internet, and who has ultimate responsibility for the content and regulation of the Internet. Legal issues are examined along with a brief discussion on current regulatory laws. Alternatives to broad regulatory laws are examined with respect to communication and social concerns.

  • Internet Privacy Database

    Internet privacy has become an overlooked yet essential part our everyday lives. At any given moment, while browsing a web page, your identity could be stolen leaving you in thousands of dollars in debt. The purpose of this paper is to aid the general public to become more aware of these issues and the laws pertaining to them. We propose the creation of a database using machine learning and data mining techniques with the specific purpose of educating and informing the general public on these laws. In effect, we hope this will raise awareness on the subject as well as aiding any legal counsel needing quick but informative answers regarding internet invasion of privacy.

  • Internet Privacy in E-Commerce: Framework, Review, and Opportunities for Future Research

    Increased Internet traffic and the sophistication of companies in tracking that traffic have made privacy a critical issue in electronic commerce (e-commerce). This has spawned a number of research works addressing Internet privacy from the perspectives of three main stakeholders - customers, companies and governments, as well as the interactions among them. The purpose of this paper is to analyze the extant studies and develop an understanding of the relationships among them. Accordingly, we review the research on Internet privacy in e-commerce that has been conducted in the fields of information systems, business, and marketing. We develop a framework for classifying the studies, review key findings, and identify opportunities for future research.

  • Factor analysis of E-commerce usage basing on Internet privacy

    Usually consumers need to provide private information when using E-commerce service. While this special information is vulnerable to leak, resulting from Internet operators' deregulation or government's surveillance and the potential venture blocks the development of E-commerce. Basing on Internet consumers' concerns about privacy violation, this paper establishes a structural equation model of the factors of Ecommerce usage which is testified through empirical research. Then we discuss the relationship of Internet industry self-regulation, concerns about government surveillance and concerns about privacy, and their effect on consumers' E-commerce usage.

  • Examining Internet privacy policies within the context of user privacy values

    Internet privacy policies describe an organization's practices on data collection, use, and disclosure. These privacy policies both protect the organization and signal integrity commitment to site visitors. Consumers use the stated website policies to guide browsing and transaction decisions. This paper compares the classes of privacy protection goals (which express desired protection of consumer privacy rights) and vulnerabilities (which potentially threaten consumer privacy) with consumer privacy values. For this study, we looked at privacy policies from nearly 50 websites and surveyed over 1000 Internet users. We examined Internet users' major expectations about website privacy and revealed a notable discrepancy between what privacy policies are currently stating and what users deem most significant. Our findings suggest several implications to privacy managers and software project managers. Results from this study can help managers determine the kinds of policies needed to both satisfy user values and ensure privacy-aware website development efforts.

  • Portable tor router: Easily enabling web privacy for consumers

    On-line privacy is of major public concern. Unfortunately, for the average consumer, there is no simple mechanism to browse the Internet privately on multiple devices. Most available Internet privacy mechanisms are either expensive, not readily available, untrusted, or simply provide trivial information masking. We propose that the simplest, most effective and inexpensive way of gaining privacy, without sacrificing unnecessary amounts of functionality and speed, is to mask the user's IP address while also encrypting all data. We hypothesized that the Tor protocol is aptly suited to address these needs. With this in mind we implemented a Tor router using a single board computer and the open-source Tor protocol code. We found that our proposed solution was able to meet five of our six goals soon after its implementation: cost effectiveness, immediacy of privacy, simplicity of use, ease of execution, and unimpaired functionality. Our final criterion of speed was sacrificed for greater privacy but it did not fall so low as to impair day-to-day functionality. With a total cost of roughly $100.00 USD and a speed cap of around 2 Megabits per second we were able to meet our goal of an affordable, convenient, and usable solution to increased on-line privacy for the average consumer.

  • Detecting router cache snooping in Named Data Networking

    Named Data Networking (NDN) is an example of studies that attempt to adapt the Internet architecture to new Internet usage patterns. To improve performance, named data is cached in NDN routers at different levels of the network hierarchy. However, caching data may be exploited to compromise consumer privacy using an attack called cache snooping. Cache snooping is the process of determining whether certain data are present on a given router cache and attribute that data to consumers. In this paper, we propose an approach to detect cache snooping attempts for low-level NDN routers.

  • How internet users' privacy concerns have evolved since 2002

    Internet privacy was the topic in this paper. A 2008 survey revealed that US Internet users' top three privacy concerns haven't changed since 2002, but privacy-related events might have influenced their level of concern within certain categories. The authors describe their results as well as the differences in privacy concerns between US and international respondents. They also mentioned that individuals have become more concerned about personalization in customized browsing experiences, monitored purchasing patterns, and targeted marketing and research.

  • Conclusion

    This chapter contains sections titled:IPv6 Addressing ConsiderationsIPv4‐IPv6 and IPv6‐IPv6 InterworkingSubscriber LoggingRecovery OptionsSummary

  • User privacy risk calculator

    User privacy is becoming an issue on the Internet due to common data breaches and various security threats. Services tend to require private user data in order to provide more personalized content and users are typically unaware of potential risks to their privacy. This paper proposes a risk calculator based on a feedforward neural network that will provide users with an ability to calculate risks to their privacy. The proposed calculator is evaluated on a set of real world example scenarios. Furthermore, to give more insight into privacy issues, each estimated risk is explained by several real life scenarios that might happen if the observed parameters are obtained by an attacker. In turn, this should raise user awareness and knowledge about privacy issues on the Internet.



Standards related to Internet Privacy

Back to Top

No standards are currently tagged "Internet Privacy"


Jobs related to Internet Privacy

Back to Top