Sciweavers

130 search results - page 14 / 26
» Location Privacy Protection Through Obfuscation-Based Techni...
Sort
View
ICDE
2007
IEEE
158views Database» more  ICDE 2007»
14 years 9 months ago
Efficient Evaluation of Imprecise Location-Dependent Queries
In location-based services, it is common for a user to issue a query based on his/her current position. One such example is "find the available cabs within two miles of my cu...
Jinchuan Chen, Reynold Cheng
HOST
2008
IEEE
14 years 2 months ago
IC Activation and User Authentication for Security-Sensitive Systems
—A number of applications depend on the protection of security-sensitive hardware, preventing unauthorized users from gaining access to the functionality of the integrated circui...
Jiawei Huang, John Lach
ACSAC
2009
IEEE
14 years 2 months ago
Protecting Commodity Operating System Kernels from Vulnerable Device Drivers
Device drivers on commodity operating systems execute with kernel privilege and have unfettered access to kernel data structures. Several recent attacks demonstrate that such poor...
Shakeel Butt, Vinod Ganapathy, Michael M. Swift, C...
RAID
2007
Springer
14 years 1 months ago
SpyShield: Preserving Privacy from Spy Add-Ons
Spyware infections are becoming extremely pervasive, posing a grave threat to Internet users’ privacy. Control of such an epidemic is increasingly difficult for the existing def...
Zhuowei Li, XiaoFeng Wang, Jong Youl Choi
CVPR
2007
IEEE
13 years 7 months ago
PrivacyCam: a Privacy Preserving Camera Using uCLinux on the Blackfin DSP
Considerable research work has been done in the area of surveillance and biometrics, where the goals have always been high performance, robustness in security and cost optimizatio...
Ankur Chattopadhyay, Terrance E. Boult