Data privacy has been growing in importance in recent years, especially with the constant increase of online activity. Consequently, researchers study, design, and develop solutions aimed at enhancing users' data privacy. The wicked problem of data privacy is a dynamic challenge that defies straightforward solutions. Since there are many factors involved in data privacy, such as technological, legal, and human aspects, we can only aim at mitigating rather than solving this wicked problem. Our aim was to explore challenges and opportunities with a focus on human aspects for designing usable crypto-based privacy-enhancing technologies (PETs). Mainly, there were three PETs in the cloud context included in our studies: malleable signatures, sec...
Computer security and privacy experts have always advocated the widespread adoption of privacy-enhan...
In this paper we explore the extent to which privacy enhancing technologies (PETs) could be effectiv...
This whitepaper, to which BISS' Johan van Soest contributed as an expert from knowledge institutions...
Data privacy has been growing in importance in recent years, especially with the constant increase o...
Data privacy has been growing in importance in recent years, especially with the continuous increase...
Data has been widely recognized as one of the most valuable assets that can be utilized to make dyna...
The amount of personal identifiable information that people distribute over different online service...
The architecture of cloud-based services is typically opaque and intricate. As a result, data subjec...
As a result of the ongoing digitization, people are increasingly interacting with digital data. Sinc...
With the increasing use of smart devices and sensors, enormous amounts of data are being generated c...
Personal data are often collected and processed in a decentralized fashion, withindifferent contexts...
People engage with multiple online services and carry out a range of different digital transactions ...
Private data is transmitted and stored online every second. Therefore, security and privacy assuranc...
Part 1: Invited PapersInternational audiencePrivacy has long been perceived as a hindrance to innova...
Currently, a popular topic in the ever growing world of information technology is the protection of ...
Computer security and privacy experts have always advocated the widespread adoption of privacy-enhan...
In this paper we explore the extent to which privacy enhancing technologies (PETs) could be effectiv...
This whitepaper, to which BISS' Johan van Soest contributed as an expert from knowledge institutions...
Data privacy has been growing in importance in recent years, especially with the constant increase o...
Data privacy has been growing in importance in recent years, especially with the continuous increase...
Data has been widely recognized as one of the most valuable assets that can be utilized to make dyna...
The amount of personal identifiable information that people distribute over different online service...
The architecture of cloud-based services is typically opaque and intricate. As a result, data subjec...
As a result of the ongoing digitization, people are increasingly interacting with digital data. Sinc...
With the increasing use of smart devices and sensors, enormous amounts of data are being generated c...
Personal data are often collected and processed in a decentralized fashion, withindifferent contexts...
People engage with multiple online services and carry out a range of different digital transactions ...
Private data is transmitted and stored online every second. Therefore, security and privacy assuranc...
Part 1: Invited PapersInternational audiencePrivacy has long been perceived as a hindrance to innova...
Currently, a popular topic in the ever growing world of information technology is the protection of ...
Computer security and privacy experts have always advocated the widespread adoption of privacy-enhan...
In this paper we explore the extent to which privacy enhancing technologies (PETs) could be effectiv...
This whitepaper, to which BISS' Johan van Soest contributed as an expert from knowledge institutions...