Sciweavers

1790 search results - page 45 / 358
» On Privacy Models for RFID
Sort
View
SICHERHEIT
2010
14 years 9 months ago
Bedrohungsmodellierung (Threat Modeling) in der Softwareentwicklung
: Threat Modeling erm
Fabian Schwab, Alexander Findeisen, Peter Sakal, H...
CSCWD
2006
Springer
15 years 3 months ago
A Model to Incorporate Privacy in Organizational Memory Systems
People are usually concerned with the privacy of their personal information. However, the problem of privacy is also present when the information is directly linked to people, for...
Valeria Herskovic, Sergio F. Ochoa, José A....
JCM
2006
86views more  JCM 2006»
14 years 11 months ago
MAC Layer RFID Protocol for Low Cost Object Identification
In this paper, we introduce a novel medium access control (MAC) protocol for Radio Frequency Identification (RFID) systems. This protocol exploits the Markov Chain Model of Slotted...
Shweta Singh
PERCOM
2005
ACM
15 years 11 months ago
Security Parallels between People and Pervasive Devices
Unique and challenging security problems arise due to the scarcity of computational, storage, and power resources in the low-cost pervasive computing environment. Particularly rel...
Stephen A. Weis
ICCV
2007
IEEE
16 years 1 months ago
A Scalable Approach to Activity Recognition based on Object Use
We propose an approach to activity recognition based on detecting and analyzing the sequence of objects that are being manipulated by the user. In domains such as cooking, where m...
Jianxin Wu, Adebola Osuntogun, Tanzeem Choudhury, ...