Sciweavers

40 search results - page 3 / 8
» pet 2007
Sort
View
HUC
2007
Springer
15 years 8 months ago
Privacy Enhancing Technologies for RFID in Retail- An Empirical Investigation
This article investigates the conflicting area of user benefits arising through item level RFID tagging and a desire for privacy. It distinguishes between three approaches feasible...
Sarah Spiekermann
ICIP
2010
IEEE
14 years 11 months ago
Stationary foreground detection using background subtraction and temporal difference in video surveillance
In this paper we describe a new algorithm focused on obtaining stationary foreground regions, which is useful for applications like the detection of abandoned/stolen objects and p...
Álvaro Bayona, Juan C. SanMiguel, Jos&eacut...
PET
2007
Springer
15 years 8 months ago
Louis, Lester and Pierre: Three Protocols for Location Privacy
Abstract. Location privacy is of utmost concern for location-based services. It is the property that a person’s location is revealed to other entities, such as a service provider...
Ge Zhong, Ian Goldberg, Urs Hengartner
PET
2007
Springer
15 years 8 months ago
Pairing-Based Onion Routing
Abstract. This paper presents a novel use of pairing-based cryptography to improve circuit construction in onion routing anonymity networks. Instead of iteratively and interactivel...
Aniket Kate, Gregory M. Zaverucha, Ian Goldberg
PET
2007
Springer
15 years 8 months ago
Performance Comparison of Low-Latency Anonymisation Services from a User Perspective
Neither of the two anonymisation services Tor and AN.ON clearly outperforms the other one. AN.ON’s user-perceived QoS is generally more consistent over time than Tor’s. While A...
Rolf Wendolsky, Dominik Herrmann, Hannes Federrath