Sciweavers

3299 search results - page 618 / 660
» Privacy and Trusted Computing
Sort
View
EUC
2008
Springer
13 years 10 months ago
A Qualitative Risk Analysis for the GPRS Technology
This paper presents a qualitative risk analysis of the General Packet Radio Service (GPRS) technology. GPRS presents several essential security weaknesses which may lead to securi...
Christos Xenakis, Danae Apostolopoulou, Angeliki P...
ACCV
2009
Springer
13 years 9 months ago
Person De-identification in Videos
Advances in cameras and web technology have made it easy to capture and share large amounts of video data over to a large number of people. A large number of cameras oversee public...
Prachi Agrawal, P. J. Narayanan
HUC
2010
Springer
13 years 9 months ago
Throw your photos: an intuitive approach for sharing between mobile phones and interactive tables
Many approaches have been proposed to connect mobile phones with interactive tables. Most rely on having the phone placed on table all times, which may hinder the overall user exp...
Fadi Chehimi, Enrico Rukzio
CSSE
2006
IEEE
13 years 8 months ago
Experimental analysis of a privacy-preserving scalar product protocol
The recent investigation of privacy-preserving data mining has been motivated by the growing concern about the privacy of individuals when their data is stored, aggregated, and mi...
Zhiqiang Yang, Rebecca N. Wright, Hiranmayee Subra...
PERCOM
2008
ACM
13 years 8 months ago
Randomized Bit Encoding for Stronger Backward Channel Protection in RFID Systems
In this paper, we introduce a randomized bit encoding scheme that can strengthen the privacy protection on RFID tags. This scheme is used together with the backward channel protec...
Tong-Lee Lim, Tieyan Li, Sze-Ling Yeo