Sciweavers

131 search results - page 21 / 27
» A Privacy-Protecting Coupon System
Sort
View
HICSS
2007
IEEE
152views Biometrics» more  HICSS 2007»
14 years 1 months ago
Analyzing Online Information Privacy Concerns: An Information Processing Theory Approach
The advent of the Internet has made the transmission of personally identifiable information common and often inadvertent to the user. As a consequence, individuals worry that comp...
Il-Horn Hann, Kai Lung Hui, Sang-Yong Tom Lee, Iva...
MOBIQUITOUS
2007
IEEE
14 years 1 months ago
Anonymous Data Collection in Sensor Networks
—Sensor networks involving human participants will require privacy protection before wide deployment is feasible. This paper proposes and evaluates a set of protocols that enable...
James Horey, Michael M. Groat, Stephanie Forrest, ...
MUE
2007
IEEE
111views Multimedia» more  MUE 2007»
14 years 1 months ago
Securing the Pharmaceutical Supply Chain using RFID
RFID technology has been applied to a number of applications. In [5], a protocol was described how to apply RFID to currency to provide integrity (e.g. reduce counterfeiting) whil...
Brian King, Xiaolan Zhang 0003
MDM
2007
Springer
279views Communications» more  MDM 2007»
14 years 1 months ago
Anonymity in Location-Based Services: Towards a General Framework
A general consensus is that the proliferation of locationaware devices will result in a diffusion of location-based services. Privacy preservation is a challenging research issue ...
Claudio Bettini, Sergio Mascetti, Xiaoyang Sean Wa...
WOWMOM
2005
ACM
133views Multimedia» more  WOWMOM 2005»
14 years 1 months ago
A Statistical Matching Approach to Detect Privacy Violation for Trust-Based Collaborations
Distributed trust and reputation management mechanisms are often proposed as a means of providing assurance in dynamic and open environments by enabling principals to building up ...
Mohamed Ahmed, Daniele Quercia, Stephen Hailes