Stochastic Mixed-Signal Circuit Design for In-Sensor Privacy
Abstract
References
Index Terms
- Stochastic Mixed-Signal Circuit Design for In-Sensor Privacy
Recommendations
Designing Privacy-by-Design
APF 2012: Revised Selected Papers of the First Annual Privacy Forum on Privacy Technologies and Policy - Volume 8319The proposal for a new privacy regulation d.d. January 25th 2012 introduces sanctions of up to 2% of the annual turnover of enterprises. This elevates the importance of mitigation of privacy risks. This paper makes Privacy by Design more concrete, and ...
Anonymity preserving sequential pattern mining
The increasing availability of personal data of a sequential nature, such as time-stamped transaction or location data, enables increasingly sophisticated sequential pattern mining techniques. However, privacy is at risk if it is possible to reconstruct ...
Toward Applying Online Privacy Patterns Based on the Design Problem: A Systematic Review
Design, User Experience, and Usability: Theory and PracticeAbstractPrivacy patterns are design solutions to common privacy problems—a way to translate “privacy-by-design” into practical advice for software engineering. This paper aims to provide a collection of privacy patterns proposed by previous work through a ...
Comments
Information & Contributors
Information
Published In

- Conference Chair:
- Tulika Mitra,
- Program Chairs:
- Evangeline Young,
- Jinjun Xiong
Sponsors
In-Cooperation
- IEEE-EDS: Electronic Devices Society
- IEEE CAS
- IEEE CEDA
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Invited-talk
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 153Total Downloads
- Downloads (Last 12 months)23
- Downloads (Last 6 weeks)3
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in