Sciweavers

1790 search results - page 71 / 358
» On Privacy Models for RFID
Sort
View
DEBU
2010
147views more  DEBU 2010»
14 years 12 months ago
Indoor - A New Data Management Frontier
Much research has been conducted on the management of outdoor moving objects. In contrast, relatively little research has been conducted on indoor moving objects. The indoor setti...
Christian S. Jensen, Hua Lu, Bin Yang 0002
CORR
2010
Springer
146views Education» more  CORR 2010»
14 years 8 months ago
NLHB : A Non-Linear Hopper Blum Protocol
The Hopper-Blum (HB) protocol, which uses noised linear parities of a shared key for authentication, has been proposed for light-weight applications such as RFID. Recently, algorit...
Mukundan Madhavan, Andrew Thangaraj, Yogesh Sankar...
VLDB
2007
ACM
138views Database» more  VLDB 2007»
15 years 6 months ago
Minimality Attack in Privacy Preserving Data Publishing
Data publishing generates much concern over the protection of individual privacy. In the well-known kanonymity model and the related models such as l-diversity and (α, k)-anonymi...
Raymond Chi-Wing Wong, Ada Wai-Chee Fu, Ke Wang, J...
EUROPKI
2007
Springer
15 years 6 months ago
Authorization Architectures for Privacy-Respecting Surveillance
Even more than in our physical world, in our digital world we need systems that meet the security objective of service providers and users in equal measure. This paper investigates...
Ulrich Flegel, Michael Meier
MSWIM
2005
ACM
15 years 5 months ago
Balancing auditability and privacy in vehicular networks
We investigate how to obtain a balance between privacy and audit requirements in vehicular networks. Challenging the current trend of relying on asymmetric primitives within VANET...
Jong Youl Choi, Markus Jakobsson, Susanne Wetzel