• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 4,002
Next 10 →

RFID security and privacy: A research survey

by Ari Juels - ISBN 978-89-5519-136-3 -88- Feb. 17-20, 2008 ICACT 2008 , 2006
"... Abstract—This paper surveys recent technical research on the problems of privacy and security for radio frequency identification (RFID). RFID tags are small, wireless devices that help identify objects and people. Thanks to dropping cost, they are likely to proliferate into the billions in the next ..."
Abstract - Cited by 353 (6 self) - Add to MetaCart
Abstract—This paper surveys recent technical research on the problems of privacy and security for radio frequency identification (RFID). RFID tags are small, wireless devices that help identify objects and people. Thanks to dropping cost, they are likely to proliferate into the billions in the next

Opinion Mining and Sentiment Analysis

by Bo Pang, Lillian Lee , 2008
"... An important part of our information-gathering behavior has always been to find out what other people think. With the growing availability and popularity of opinion-rich resources such as online review sites and personal blogs, new opportunities and challenges arise as people now can, and do, active ..."
Abstract - Cited by 749 (3 self) - Add to MetaCart
challenges raised by sentiment-aware applications, as compared to those that are already present in more traditional fact-based analysis. We include materialon summarization of evaluative text and on broader issues regarding privacy, manipulation, and economic impact that the development of opinion

Privacy and Security Challenges of RFID

by Smriti Pande, Mike F. Unuakhalu
"... This paper reviews the background of Radio Frequency Identification (RFID) systems as well as the ethical foundations of individual privacy. A number of applications were also explored with the intention of identifying the technology’s benefits and possible misuses. The authors offer an overview and ..."
Abstract - Add to MetaCart
and discussion of the most important ethical issues concerning RFID, describe, and examine some methods of protecting privacy. Additionally, the paper examines the security risks associated with RFID technology, and privacy issues and challenges that they present to the operations of a business that implement

Data privacy through optimal k-anonymization

by Roberto J. Bayardo - In ICDE , 2005
"... Data de-identification reconciles the demand for release of data for research purposes and the demand for privacy from individuals. This paper proposes and evaluates an optimization algorithm for the powerful de-identification procedure known as k-anonymization. A k-anonymized dataset has the proper ..."
Abstract - Cited by 344 (3 self) - Add to MetaCart
Data de-identification reconciles the demand for release of data for research purposes and the demand for privacy from individuals. This paper proposes and evaluates an optimization algorithm for the powerful de-identification procedure known as k-anonymization. A k-anonymized dataset has

Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems

by Stephen A. Weis, Sanjay E. Sarma, Ronald L. Rivest, Daniel W. Engels , 2003
"... Like many technologies, low-cost Radio Frequency Identification (RFID) systems will become pervasive in our daily lives when affixed to everyday consumer items as "smart labels". While yielding great productivity gains, RFID systems may create new threats to the security and privacy of ..."
Abstract - Cited by 311 (5 self) - Add to MetaCart
Like many technologies, low-cost Radio Frequency Identification (RFID) systems will become pervasive in our daily lives when affixed to everyday consumer items as "smart labels". While yielding great productivity gains, RFID systems may create new threats to the security and privacy

The blocker tag: Selective blocking of RFID tags for consumer privacy

by Ari Juels , Ronald L. Rivest, Michael Szydlo - 8TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY , 2003
"... We propose the use of "selective blocking" by "blocker tags" as a way of protecting consumers from unwanted scanning of RFID tags attached to items they may be carrying or wearing. While ..."
Abstract - Cited by 242 (14 self) - Add to MetaCart
We propose the use of "selective blocking" by "blocker tags" as a way of protecting consumers from unwanted scanning of RFID tags attached to items they may be carrying or wearing. While

Security In Wireless Sensor Networks

by Adrian Perrig, John Stankovic, David Wagner - COMMUNICATIONS OF THE ACM , 2004
"... Wireless sensor network applications include ocean and wildlife monitoring, manufacturing machinery performance monitoring, building safety and earthquake monitoring, and many military applications. An even wider spectrum of future applications is likely to follow, including the monitoring of highw ..."
Abstract - Cited by 360 (5 self) - Add to MetaCart
security issues in these networks, discuss the state of the art in sensor network security, and suggest future directions for research. We cover several important security challenges, including key establishment, secrecy, authentication, privacy, robustness to denial-of-service attacks, secure routing

RFID PRIVACY ISSUES AND TECHNICAL CHALLENGES

by I L Lustrat, R Ichard Downs, Shingo Kinoshita
"... enough to ensure personal data privacy are required before retailers implement and consumers trust and confidently use them on a mass scale. ..."
Abstract - Add to MetaCart
enough to ensure personal data privacy are required before retailers implement and consumers trust and confidently use them on a mass scale.

Executing SQL over Encrypted Data in the Database-Service-Provider Model

by Hakan Hacigümüs, Bala Iyer, Chen Li, Sharad Mehrotra , 2002
"... Rapid advances in networking and Internet technologies have fueled the emergence of the "software as a service" model for enterprise computing. Successful examples of commercially viable software services include rent-a-spreadsheet, electronic mail services, general storage services, disas ..."
Abstract - Cited by 342 (9 self) - Add to MetaCart
, disaster protection services. "Database as a Service" model provides users power to create, store, modify, and retrieve data from anywhere in the world, as long as they have access to the Internet. It introduces several challenges, an important issue being data privacy. It is in this context

User Privacy in RFID Networks

by Dave Singelée, Stefaan Seys
"... Wireless RFID networks are getting deployed at a rapid pace and have already entered the public space on a massive scale: public transport cards, the biometric passport, office ID tokens, customer loyalty cards, etc. Although RFID technology offers interesting services to customers and retailers, it ..."
Abstract - Add to MetaCart
some of them with cases that have received press coverage. We will present the main challenges of enhancing privacy in RFID networks and evaluate some solutions proposed in literature. The main advantages and shortcomings will be briefly discussed. Finally, we will give an overview of some academic
Next 10 →
Results 1 - 10 of 4,002
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University