-
1
-
-
70349466927
-
-
Insider attacks. http://csrc.nist.gov/pubiications/nistir/threats/ subsection3-4-1.html, 1994.
-
(1994)
Insider attacks
-
-
-
2
-
-
70349454344
-
-
Responsphere. http://www.responsphere.org, 2007.
-
(2007)
Responsphere
-
-
-
3
-
-
70349445692
-
-
J. G. M. V. A. Machanavajjhala, D. Kifer. L-diversily: Privacy beyond k-anonyraity. In ICDE 2006.
-
J. G. M. V. A. Machanavajjhala, D. Kifer. L-diversily: Privacy beyond k-anonyraity. In ICDE 2006.
-
-
-
-
4
-
-
0036360781
-
Routing through the mist: Privacy preserving communication in ubiquitous computing environments
-
IEEE Computer Society
-
J. Al-Muhtadi, R. Campbell, A. Kapadia, M. D. Miekunas, and S. Yi. Routing through the mist: Privacy preserving communication in ubiquitous computing environments. In ICDCS'02, page 74. IEEE Computer Society, 2002.
-
(2002)
ICDCS'02
, pp. 74
-
-
Al-Muhtadi, J.1
Campbell, R.2
Kapadia, A.3
Miekunas, M.D.4
Yi, S.5
-
5
-
-
27944454864
-
Location privacy in mobile systems: A personalized anonymization model
-
L. L. B. Gedik. Location privacy in mobile systems: A personalized anonymization model. In ICDCS, 2005.
-
(2005)
ICDCS
-
-
Gedik, L.L.B.1
-
6
-
-
2442446612
-
Towards Security and Privacy for Pervasive Computing
-
R. Campbell and et. al. Towards Security and Privacy for Pervasive Computing. In ISSS 2002, 2002.
-
(2002)
ISSS 2002
-
-
Campbell, R.1
and et., al.2
-
7
-
-
70349468137
-
-
A. Demcrs, J. Gehike, M. Hong, M. Riedewald, and W. White. Towards expressive publish/subscribe systems. In ICDE2006, 2006.
-
A. Demcrs, J. Gehike, M. Hong, M. Riedewald, and W. White. Towards expressive publish/subscribe systems. In ICDE2006, 2006.
-
-
-
-
8
-
-
33745926661
-
Towards self-protecting ubiquitous systems: Monitoring trust-based interactions
-
C. English, S. Terzis, and P. Nixon. Towards self-protecting ubiquitous systems: Monitoring trust-based interactions. In Personal and Ubiquitous Computing. 9(6), 2005.
-
(2005)
Personal and Ubiquitous Computing
, vol.9
, Issue.6
-
-
English, C.1
Terzis, S.2
Nixon, P.3
-
9
-
-
14944378854
-
The networked sensor tapestry (nest): A privacy enhanced software architecture for interactive analysis of data in video-sensor networks
-
New York, NY. USA, ACM Press
-
D. A. Fidalco, H.-A. Nguyen, and M. Trivedi. The networked sensor tapestry (nest): a privacy enhanced software architecture for interactive analysis of data in video-sensor networks. In VSSN '04: Proceedings of the ACM 2nd international workshop on Video surveillance & sensor networks, pages 46-53, New York, NY. USA, 2004. ACM Press.
-
(2004)
VSSN '04: Proceedings of the ACM 2nd international workshop on Video surveillance & sensor networks
, pp. 46-53
-
-
Fidalco, D.A.1
Nguyen, H.-A.2
Trivedi, M.3
-
11
-
-
0028736282
-
Detecting composite events in active database systems using petri nets
-
S. Gatzui and K. Dittrich. Detecting composite events in active database systems using petri nets. In 4th RIDE-AIDS (2-9), 1994.
-
(1994)
4th RIDE-AIDS (2-9)
-
-
Gatzui, S.1
Dittrich, K.2
-
12
-
-
34748858582
-
Design and implementation of a middleware for sentient spaces
-
B. Hore, H. Jafarpour, R. Jain, S. Ji, D. Massaguer, S. Mehrotra, N. Venkalasubramanian, and U. Westermann. Design and implementation of a middleware for sentient spaces. In Proceedings of ISI'07, 2007.
-
(2007)
Proceedings of ISI'07
-
-
Hore, B.1
Jafarpour, H.2
Jain, R.3
Ji, S.4
Massaguer, D.5
Mehrotra, S.6
Venkalasubramanian, N.7
Westermann, U.8
-
15
-
-
35248832722
-
Squeling Euros: Privacy Protection in RFID-Enabled bank notes
-
Springer-Verlag
-
A. Juels and R. Pappu. Squeling Euros: Privacy Protection in RFID-Enabled bank notes. In Financial Cryptography, volume LNCS 2742. pages 103-121. Springer-Verlag, 2003.
-
(2003)
Financial Cryptography
, vol.LNCS 2742
, pp. 103-121
-
-
Juels, A.1
Pappu, R.2
-
16
-
-
64549108398
-
Security and privacy for distributed multimedia sensor networks
-
Jan
-
D. Kundur, W. Luh, U. Okorafor, and T Zourntos. Security and privacy for distributed multimedia sensor networks. Proceedings of the IEEE, 96(1): 112-130. Jan. 2008.
-
(2008)
Proceedings of the IEEE
, vol.96
, Issue.1
, pp. 112-130
-
-
Kundur, D.1
Luh, W.2
Okorafor, U.3
Zourntos, T.4
-
17
-
-
34548805858
-
-
N. Li, T. Li, and S. Venkatasubramanian. t-closeness: Privacy beyond k-anonymity and l-diversity. In ICDE 2007.
-
N. Li, T. Li, and S. Venkatasubramanian. t-closeness: Privacy beyond k-anonymity and l-diversity. In ICDE 2007.
-
-
-
-
18
-
-
0042627207
-
Some np-complete problems similar to graph isomorphism
-
Feb
-
A. Lubiw. Some np-complete problems similar to graph isomorphism. In SIAM Journal of Computing, Feb. 1981.
-
(1981)
SIAM Journal of Computing
-
-
Lubiw, A.1
-
21
-
-
84932647328
-
An ontology for video event representation
-
R. Nevada, J. Hobbs, and B. Bolles. An ontology for video event representation. In CVPRW, page 119, 2004.
-
(2004)
CVPRW
, pp. 119
-
-
Nevada, R.1
Hobbs, J.2
Bolles, B.3
-
22
-
-
14644429006
-
Preserving privacy by de-identifying face images
-
E. M. Newton, L. Sweeney, and B. Malin. Preserving privacy by de-identifying face images. IEEE Transactions on Knowledge and Data Engineering, 17(2):232-243, 2005.
-
(2005)
IEEE Transactions on Knowledge and Data Engineering
, vol.17
, Issue.2
, pp. 232-243
-
-
Newton, E.M.1
Sweeney, L.2
Malin, B.3
-
25
-
-
0003483188
-
Protecting Privacy when Disclosing Information: K-Anonymity and Its Enforcement through Generalization and Suppression. Technical report
-
SRI International, 1998
-
P. Samarati and L. Sweeney Protecting Privacy when Disclosing Information: k-Anonymity and Its Enforcement through Generalization and Suppression. Technical report, As technical report, SRI International, 1998.
-
As technical report
-
-
Samarati, P.1
Sweeney, L.2
-
28
-
-
70349461276
-
Providing middleware support for active space applications
-
M. Roman and R. H. Campbell. Providing middleware support for active space applications. In Middleware 2003, 2003.
-
(2003)
Middleware 2003
-
-
Roman, M.1
Campbell, R.H.2
-
29
-
-
1642267577
-
Challenge: Ubiquitous location-aware computing and the "place lab" initiative
-
ACM New York, NY, USA
-
B. Schilit, A. LaMarca, G. Borriello, W. Griswold, D. McDonald, E. Lazowska. A. Balachandran, J. Hong, and V. Iverson. Challenge: ubiquitous location-aware computing and the "place lab" initiative. In Proceedings of the 1st ACM International workshop on Wireless mobile applications and services on WLAN hotspots, pages 29-35. ACM New York, NY, USA, 2003.
-
(2003)
Proceedings of the 1st ACM International workshop on Wireless mobile applications and services on WLAN hotspots
, pp. 29-35
-
-
Schilit, B.1
LaMarca, A.2
Borriello, G.3
Griswold, W.4
McDonald, D.5
Lazowska, E.6
Balachandran, A.7
Hong, J.8
Iverson, V.9
-
30
-
-
20844455524
-
Enabling video privacy through computer vision
-
A. Senior, S. Pankanti, A. Hampapur, L. Brown. Y.-L. Tian, A. Ekin, J. Connell. C. F. Shu, and M. Lu. Enabling video privacy through computer vision. In Security & Privacy Magazine, IEEE, Vol.3, Iss.3, pages 50-57, 2005.
-
(2005)
Security & Privacy Magazine, IEEE
, vol.3
, Issue.ISS.3
, pp. 50-57
-
-
Senior, A.1
Pankanti, S.2
Hampapur, A.3
Brown, L.4
Tian, Y.-L.5
Ekin, A.6
Connell, J.7
Shu, C.F.8
Lu, M.9
-
32
-
-
0036811662
-
k-anonymity: A model for protecting privacy
-
L. Sweeney, k-anonymity: a model for protecting privacy. In International Journal on Uncertainty, Fuzziness and Knowledge-based Systems, volume 10 (5), pages 557-570, 2002.
-
(2002)
International Journal on Uncertainty, Fuzziness and Knowledge-based Systems
, vol.10
, Issue.5
, pp. 557-570
-
-
Sweeney, L.1
-
33
-
-
84995706345
-
-
D. E. D. Vinkemeier and S. Hougardy. A linear-time approximation algorithm for weighted matchings in graphs. ACM Trans. Algorithms, 1(1): 107-122, 2005.
-
D. E. D. Vinkemeier and S. Hougardy. A linear-time approximation algorithm for weighted matchings in graphs. ACM Trans. Algorithms, 1(1): 107-122, 2005.
-
-
-
-
34
-
-
35048876270
-
Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems
-
Security in Pervasive Computing, of
-
S. A. Wets, S. E. Sarma, R. L. Rivest, and D. W. Engels. Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. In Security in Pervasive Computing, volume 2802 of Lecture Notes in Computer Science, pages 201-212, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.2802
, pp. 201-212
-
-
Wets, S.A.1
Sarma, S.E.2
Rivest, R.L.3
Engels, D.W.4
-
35
-
-
13444271747
-
Privacy protecting data collection in media spaces
-
J. Wickramasuriya, M. Datt, S. Mehrotra, and N. Venkatasubramanian. Privacy protecting data collection in media spaces. In ACM Multimedia Conference, pages 48-55, 2004.
-
(2004)
ACM Multimedia Conference
, pp. 48-55
-
-
Wickramasuriya, J.1
Datt, M.2
Mehrotra, S.3
Venkatasubramanian, N.4
-
37
-
-
70349465101
-
-
IBM PCI cryptographic coprocessor
-
IBM PCI cryptographic coprocessor. 2004. http://www.ibm.com/security/ cryptocards
-
(2004)
-
-
|