Kwecka, Zbigniew, Buchanan, William J and Spiers, Duncan A (2010) Privacy-preserving data acquisition protocol. In: IEEE International Conference of Computational Methods in Electrical and Electronics Engineering. IEEE, Listvyanka, 131 - 136. ISBN 978-1-4244-7625-1
Available under License Creative Commons Attribution Non-commercial.
Current investigative data acquisition techniques often breach human and natural rights of the data subject and can jeopardize an investigation. Often the investigators need to reveal to the data controller precise details of their suspect’s identity or suspect’s profile. In this research a novel approach to investigative data acquisition is presented and privacy preserving Investigative Data Acquisition Protocol (IDAP) is defined. This protocol is the first that allows for performing private information retrieval of records matching multiple selection criteria.
|Item Type:||Book Section|
|Additional Information:||“© © 2010 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.”|
|Uncontrolled Keywords:||Cryptography; data acquisition; privacy; IDAP; investigative data acquisition protocol;|
|University Divisions/Research Centres:||Faculty of Engineering, Computing and Creative Industries > School of Computing|
|Dewey Decimal Subjects:||000 Computer science, information & general works > 000 Computer science, knowledge & systems > 005 Computer programming, programs & data > 005.8 Data security|
|Library of Congress Subjects:||Q Science > QA Mathematics > QA75 Electronic computers. Computer science|
|Depositing User:||Professor Bill Buchanan|
|Date Deposited:||22 Dec 2010 20:08|
|Last Modified:||19 Nov 2013 13:54|
Actions (login required)