Kwecka, Zbigniew, Buchanan, William J and Spiers, Duncan A (2010) Privacy-preserving data acquisition protocol. In: IEEE International Conference of Computational Methods in Electrical and Electronics Engineering. IEEE, Listvyanka, 131 - 136. ISBN 978-1-4244-7625-1
Available under License Creative Commons Attribution Non-commercial.
Current investigative data acquisition techniques often breach human and natural rights of the data subject and can jeopardize an investigation. Often the investigators need to reveal to the data controller precise details of their suspect’s identity or suspect’s profile. In this research a novel approach to investigative data acquisition is presented and privacy preserving Investigative Data Acquisition Protocol (IDAP) is defined. This protocol is the first that allows for performing private information retrieval of records matching multiple selection criteria.
|Item Type:||Book Section|
|Uncontrolled Keywords:||Cryptography; data acquisition; privacy; IDAP; investigative data acquisition protocol;|
|University Divisions/Research Centres:||Faculty of Engineering, Computing and Creative Industries > School of Computing|
|Dewey Decimal Subjects:||000 Computer science, information & general works > 000 Computer science, knowledge & systems > 005 Computer programming, programs & data > 005.8 Data security|
|Library of Congress Subjects:||Q Science > QA Mathematics > QA75 Electronic computers. Computer science|
|Depositing User:||Professor Bill Buchanan|
|Date Deposited:||22 Dec 2010 20:08|
|Last Modified:||26 Jan 2012 16:52|
Actions (login required)