Sciweavers

515 search results - page 64 / 103
» Measuring Voter-Controlled Privacy
Sort
View
ISSA
2004
13 years 11 months ago
Intrinsic Legal Issues In It Security
E-commerce is a rapidly expanding sector all over the world. While this is apparently good news to the world's consumers and business companies, it is creating big challenges...
Respickius Casmir
ADHOC
2007
130views more  ADHOC 2007»
13 years 10 months ago
Implementation of security policy for clinical information systems over wireless sensor networks
Various healthcare areas such as diagnosis, surgery, intensive care and treatment, and patient monitoring in general, would greatly benefit from light, autonomous devices which c...
Jelena V. Misic, Vojislav B. Misic
CCR
2010
133views more  CCR 2010»
13 years 10 months ago
The role of network trace anonymization under attack
In recent years, academic literature has analyzed many attacks on network trace anonymization techniques. These attacks usually correlate external information with anonymized data...
Martin Burkhart, Dominik Schatzmann, Brian Trammel...
PERCOM
2008
ACM
13 years 9 months ago
Randomized Bit Encoding for Stronger Backward Channel Protection in RFID Systems
In this paper, we introduce a randomized bit encoding scheme that can strengthen the privacy protection on RFID tags. This scheme is used together with the backward channel protec...
Tong-Lee Lim, Tieyan Li, Sze-Ling Yeo
PERVASIVE
2006
Springer
13 years 9 months ago
The Smart Tachograph - Individual Accounting of Traffic Costs and Its Implications
Today, several costs caused by road traffic may either be only roughly approximated, or cannot be clearly assigned to the drivers causing them, or both. They are typically distribu...
Vlad Coroama