• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 28,873
Next 10 →

Privacy Enhancing Technologies for the Internet

by Ian Goldberg - In COMPCON ’97 , 1997
"... In 1997 with Wagner and Brewer, and again in 2002, we looked at the then-current state of privacy-enhancing technologies (PETs) for the Internet. [27, 26] Now, in 2007, we take a third look. Technologies to help users maintain their privacy online are as important today as ever before—if not more so ..."
Abstract - Cited by 10 (2 self) - Add to MetaCart
In 1997 with Wagner and Brewer, and again in 2002, we looked at the then-current state of privacy-enhancing technologies (PETs) for the Internet. [27, 26] Now, in 2007, we take a third look. Technologies to help users maintain their privacy online are as important today as ever before—if not more

Privacy-enhancing technologies for the Internet

by Ian Goldberg, et al.
"... The increased use of the Internet for everyday activities is bringing new threats to personal privacy. This paper gives an overview of existing and potential privacyenhancing technologies for the Internet, as well as motivation and challenges for future work in this field. ..."
Abstract - Cited by 129 (5 self) - Add to MetaCart
The increased use of the Internet for everyday activities is bringing new threats to personal privacy. This paper gives an overview of existing and potential privacyenhancing technologies for the Internet, as well as motivation and challenges for future work in this field.

Teaching Privacy-Enhancing Technologies

by Simone Fischer-Hübner, Helena Lindskog - PROCEEDINGS OF IFIP/SEC 97, LNCS
"... This paper discusses the increasing relevance of privacy-enhancing technologies (PET) and the importance of teaching PET within IT-security curricula. A structure for a PET course is presented, which can be used for designing PET overview courses or PET introductory lectures. A suggested applica ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
This paper discusses the increasing relevance of privacy-enhancing technologies (PET) and the importance of teaching PET within IT-security curricula. A structure for a PET course is presented, which can be used for designing PET overview courses or PET introductory lectures. A suggested

Privacy Enhancing Technologies

by Geoff Skinner, Song Han, Elizabeth Chang
"... Information privacy is a very subjective and context sensitive area of research open to many interpretations. As such it has seen an increasing number of solutions proposed that address the issue of privacy protection. What is missing is a way of classifying the level of protection these privacy pro ..."
Abstract - Add to MetaCart
protecting solutions provide. This paper addresses this problem by firstly defining the computational view of Information Privacy. Within this view three levels of privacy protection are defined and applied to a number of Privacy Enhancing Technologies that are in use today or in current development

A.: Privacy-enhancing technologies

by Yang Wang, Alfred Kobsa - Social and Organizational Liabilities in Information Security. IGI Global , 2009
"... Privacy-enhancing technologies (PETs), which constitute a wide array of technical means for protecting users ’ privacy, have gained considerable momentum in both academia and industry. However, existing surveys of PETs fail to delineate what sorts of privacy the described technologies enhance, which ..."
Abstract - Cited by 6 (1 self) - Add to MetaCart
Privacy-enhancing technologies (PETs), which constitute a wide array of technical means for protecting users ’ privacy, have gained considerable momentum in both academia and industry. However, existing surveys of PETs fail to delineate what sorts of privacy the described technologies enhance

Evaluation of Privacy Enhancing Technologies

by Elpidoforos Arapantonis, Elpidoforos Arapantonis, Examiner Erland Jonsson
"... burg the non-exclusive right to publish the Work electronically and in a non-commercial purpose make it accessible on the Internet. The Author warrants that he/she is the author to the Work, and warrants that the Work does not contain text, pictures or other material that violates copyright law. The ..."
Abstract - Add to MetaCart
necessary permission from this third party to let Chalmers University of Technology and University of Gothenburg store the Work electronically and make it accessible on the Internet.

Privacy Enhanced Technologies: Methods - Markets - Misuse

by Hannes Federrath - In: Lecture Notes in Computer Science, Proceedings of 2nd International Conference on Trust, Privacy, and Security in Digital Business (TrustBus
"... Abstract. Research in Privacy Enhancing Technologies has a tradition of about 25 years. The basic technologies and ideas were found until 1995 while the last decade was dominated by the utilisation of such technolo-gies. The question arises if there is a market for Privacy Enhanced Tech-nology. The ..."
Abstract - Cited by 2 (1 self) - Add to MetaCart
Abstract. Research in Privacy Enhancing Technologies has a tradition of about 25 years. The basic technologies and ideas were found until 1995 while the last decade was dominated by the utilisation of such technolo-gies. The question arises if there is a market for Privacy Enhanced Tech-nology

A layered architecture for privacy-enhancing technologies

by Martin S Olivier - South African Computer Journal , 2003
"... While a number of privacy-enhancing technologies have been proposed over the past quarter century, very little has been done to generalise the notion. Privacy-enhancing technologies have typically been discussed for specific applications (such as confidential and/or anonymous e-mail) or in specific ..."
Abstract - Cited by 7 (5 self) - Add to MetaCart
While a number of privacy-enhancing technologies have been proposed over the past quarter century, very little has been done to generalise the notion. Privacy-enhancing technologies have typically been discussed for specific applications (such as confidential and/or anonymous e-mail) or in specific

Uniting Legislation with RFID Privacy-Enhancing Technologies

by Melanie R. Rieback, Bruno Crispo, Andrew S. Tanenbaum
"... RFID is a popular identification and automation technology with serious security and privacy threats. Legislation expounds upon the actual security and privacy needs of people in RFID-enabled environments, while technology helps to ensure legal compliance. This paper examines the main aims of RFID p ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
privacy legislation, and explains how to achieve them using RFID privacy-enhancing technologies. The discussion reveals that multiple RFID privacyenhancing technologies must be combined and coordinated to achieve the protection of an individual. People currently do not have a tool that allows them to do

vPETs: Privacy Enhancing Technologies

by Yves Deswarte, O Législation
"... La sécurité des réseaux s’améliore vLégislation (mars 2000) sur les signatures électroniques-> IGC (PKI) vIP-Sec-> IPv6 vProgrès de la détection d’intrusions … mais croissance des menaces vDDoS vFraude dans l’e-Commerce vCriminalité transfrontière v … et les failles sont nombreuses! … d’où enc ..."
Abstract - Add to MetaCart
La sécurité des réseaux s’améliore vLégislation (mars 2000) sur les signatures électroniques-> IGC (PKI) vIP-Sec-> IPv6 vProgrès de la détection d’intrusions … mais croissance des menaces vDDoS vFraude dans l’e-Commerce vCriminalité transfrontière v … et les failles sont nombreuses! … d’où encore plus de sécurité vFiltrage à la source v“Traçabilité” o FAI o Serveurs vDanger pour la vie privée
Next 10 →
Results 1 - 10 of 28,873
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University