The Community for Technology Leaders
RSS Icon
Issue No.04 - October-December (2007 vol.6)
pp: 73-75
Charalampos Patrikakis , National Technical University of Athens
Pantelis Karamolegkos , National Technical University of Athens
Athanasios Voulodimos , National Technical University of Athens
Mohd Helmy Abd Wahab , Universiti Tun Hussein Onn Malaysia
Nik Shahidah Afifi Mohd Taujuddin , Universiti Tun Hussein Onn Malaysia
Christina Hanif , Universiti Tun Hussein Onn Malaysia
Linda Pareschi , University of Milan
Daniele Riboni , University of Milan
Stefan G. Weber , Technische Universität Darmstadt
Andreas Heinemann , Technische Universität Darmstadt
Sen-ching Samson Cheung , University of Kentucky
Jayahsri Chaudhari , University of Kentucky
Jithendra K. Paruchuri , University of Kentucky
This Works in Progress department features six projects relating to security and privacy. The first two entries address an individual's privacy concerns and preferences. The next discusses a project on data protection for electronic passports. The remaining three entries investigate various types of privacy protection mechanisms for data collected in pervasive computing environments, by attestation services, and by voice recording systems. This department is part of a special issue on security and privacy.
pervasive computing, privacy, security, technology awareness, user needs, context-aware mobile services, encryption, electronic data, e-passport, sensing technology, k-anonymity techniques, attestation services, speaker identification, pitch shifting, voice morphing
Charalampos Patrikakis, Pantelis Karamolegkos, Athanasios Voulodimos, Mohd Helmy Abd Wahab, Nik Shahidah Afifi Mohd Taujuddin, Christina Hanif, Linda Pareschi, Daniele Riboni, Stefan G. Weber, Andreas Heinemann, Sen-ching Samson Cheung, Jayahsri Chaudhari, Jithendra K. Paruchuri, "Security and Privacy in Pervasive Computing", IEEE Pervasive Computing, vol.6, no. 4, pp. 73-75, October-December 2007, doi:10.1109/MPRV.2007.86
1. J. Chaudhari, S.-c. Cheung, and M.V. Venkatesh, "Privacy Protection for Life-Log Video," Proc. IEEE Workshop Signal Processing Applications for Public Security and Forensics, IEEE Press, 2007, pp. 1–5;
2. L. Sweeney, "K-anonymity: A Model for Protecting Privacy," Int'l J. Uncertainty, Fuzziness, and Knowledge-Based Systems, vol. 10, no. 5, 2002, pp. 557–570.
386 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool