-
1
-
-
85032751373
-
Privacy in video surveillance
-
March
-
A. Cavallaro, "Privacy in Video Surveillance," IEEE Signal Processing Magazine, vol. 24, no. 2, pp. 168-166, March 2007.
-
(2007)
IEEE Signal Processing Magazine
, vol.24
, Issue.2
, pp. 166-168
-
-
Cavallaro, A.1
-
2
-
-
68949132673
-
A survey of visual sensor networks
-
May
-
S. Soro and W. Heinzelman, "A Survey of Visual Sensor Networks," Advances in Multimedia, vol. 2009, pp. 1-21, May 2009.
-
(2009)
Advances in Multimedia
, vol.2009
, pp. 1-21
-
-
Soro, S.1
Heinzelman, W.2
-
3
-
-
70349449310
-
Dynamic privacy in public surveillance
-
Sep.
-
S. Moncrieff, S. Venkatesh, and G. A. W. West, "Dynamic Privacy in Public Surveillance," IEEE Computer, vol. 42, no. 9, pp. 22-28, Sep. 2009.
-
(2009)
IEEE Computer
, vol.42
, Issue.9
, pp. 22-28
-
-
Moncrieff, S.1
Venkatesh, S.2
West, G.A.W.3
-
4
-
-
71549130796
-
Security and privacy protection for automated video surveillance
-
N. Baaziz, N. Lolo, O. Padilla, and F. Petngang, "Security and Privacy Protection for Automated Video Surveillance," in Proceedings of the IEEE Int. Symposium on Signal Processing and Information Technology, 2007, pp. 17-22.
-
(2007)
Proceedings of the IEEE Int. Symposium on Signal Processing and Information Technology
, pp. 17-22
-
-
Baaziz, N.1
Lolo, N.2
Padilla, O.3
Petngang, F.4
-
8
-
-
55549106767
-
Security and privacy in distributed smart cameras
-
October
-
D. N. Serpanos and A. Papalambrou, "Security and Privacy in Distributed Smart Cameras," Proceedings of the IEEE, vol. 96, no. 10, pp. 1678-1687, October 2008.
-
(2008)
Proceedings of the IEEE
, vol.96
, Issue.10
, pp. 1678-1687
-
-
Serpanos, D.N.1
Papalambrou, A.2
-
9
-
-
20844455524
-
Enabling video privacy through computer vision
-
May/June
-
A. Senior, S. Pankanti, A. Hampapur, L. Brown, Y.-L. Tian, A. Ekin, J. Connell, C. F. Shu, and M. Lu, "Enabling Video Privacy through Computer Vision," IEEE Security & Privacy Magazine, vol. 3, no. 3, pp. 50-57, May/June 2005.
-
(2005)
IEEE Security & Privacy Magazine
, vol.3
, Issue.3
, pp. 50-57
-
-
Senior, A.1
Pankanti, S.2
Hampapur, A.3
Brown, L.4
Tian, Y.-L.5
Ekin, A.6
Connell, J.7
Shu, C.F.8
Lu, M.9
-
12
-
-
70350633575
-
Tagging the turtle: Local attestation for kiosk computing
-
R. Toegl, "Tagging the Turtle: Local Attestation for Kiosk Computing," in Advances in Information Security and Assurance, 2009, pp. 60-69.
-
(2009)
Advances in Information Security and Assurance
, pp. 60-69
-
-
Toegl, R.1
-
13
-
-
61849133288
-
Seeing-is- Believing: Using camera phones for human-verifiable authentication
-
J. M. McCune, A. Perrig, and M. K. Reiter, "Seeing-Is- Believing: Using Camera Phones for Human-Verifiable Authentication," Int. Journal of Security and Networks (IJSN), vol. 4, no. 1/2, pp. 43-56, 2009.
-
(2009)
Int. Journal of Security and Networks (IJSN)
, vol.4
, Issue.1-2
, pp. 43-56
-
-
McCune, J.M.1
Perrig, A.2
Reiter, M.K.3
-
14
-
-
57349173947
-
Trustworthy and personalized computing on public kiosks
-
S. Garriss, R. Ćaceres, S. Berger, R. Sailer, L. van Doorn, and X. Zhang, "Trustworthy and Personalized Computing on Public Kiosks," in Proceedings of the Int. Conf. on Mobile Systems, Applications, and Services, 2008, pp. 199-210.
-
(2008)
Proceedings of the Int. Conf. on Mobile Systems, Applications, and Services
, pp. 199-210
-
-
Garriss, S.1
Ćaceres, R.2
Berger, S.3
Sailer, R.4
Van Doorn, L.5
Zhang, X.6
-
15
-
-
56649088077
-
A demonstrative ad hoc attestation system
-
E. Bangerter, M. Djackov, and A.-R. Sadeghi, "A Demonstrative Ad Hoc Attestation System," in Proceedings of the Int. Conf. on Information Security (ISC), 2008, pp. 17-30.
-
(2008)
Proceedings of the Int. Conf. on Information Security (ISC)
, pp. 17-30
-
-
Bangerter, E.1
Djackov, M.2
Sadeghi, A.-R.3
-
16
-
-
33947635594
-
Loud and clear: Human-verifiable authentication based on audio
-
M. T. Goodrich, M. Sirivianos, J. Solis, G. Tsudik, and E. Uzun, "Loud and Clear: Human-Verifiable Authentication Based on Audio," in Proceedings of the IEEE Int. Conf. on Distributed Computing Systems (ICDCS), 2006.
-
(2006)
Proceedings of the IEEE Int. Conf. on Distributed Computing Systems (ICDCS)
-
-
Goodrich, M.T.1
Sirivianos, M.2
Solis, J.3
Tsudik, G.4
Uzun, E.5
-
18
-
-
77957806075
-
-
Level 2, Revision 103, Trusted Computing Group Std., July
-
TPM Main Specification Version 1.2, Level 2, Revision 103, Trusted Computing Group Std., July 2007.
-
(2007)
TPM Main Specification Version 1.2
-
-
-
19
-
-
70350639602
-
A privacyca for anonymity and trust
-
M. Pirker, R. Toegl, D. Hein, and P. Danner, "A PrivacyCA for Anonymity and Trust," in Proceedings of the Int. Conf. on Trusted Computing (TRUST), 2009, pp. 101-119.
-
(2009)
Proceedings of the Int. Conf. on Trusted Computing (TRUST)
, pp. 101-119
-
-
Pirker, M.1
Toegl, R.2
Hein, D.3
Danner, P.4
-
21
-
-
70349693912
-
Bokode: Imperceptible visual tags for camera based interaction from a distance
-
article No. 98
-
A. Mohan, G. Woo, S. Hiura, Q. Smithwick, and R. Raskar, "Bokode: Imperceptible Visual Tags for Camera Based Interaction from a Distance," in Proceedings of the International Conference on Computer Graphics and Interactive Techniques, 2009, pp. 1-8, article No. 98.
-
(2009)
Proceedings of the International Conference on Computer Graphics and Interactive Techniques
, pp. 1-8
-
-
Mohan, A.1
Woo, G.2
Hiura, S.3
Smithwick, Q.4
Raskar, R.5
|