Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 231,143,180 papers from all fields of science
Search
Sign In
Create Free Account
Privacy-enhancing technologies
Known as:
PET
, Privacy enhancing technologies
Privacy-Enhancing Technologies (PET) is the standardized term referring to specific methods that act in accordance with the laws of data protection…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
24 relations
Anonymous web browsing
Credential
Cypherpunk
Digital credential
Expand
Broader (2)
Identity management
Privacy
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
The Road to Privacy in IoT: Beyond Encryption and Signatures, Towards Unobservable Communication
R. C. Staudemeyer
,
H. C. Pöhls
,
M. Wójcik
IEEE International Symposium on a World of…
2018
Corpus ID: 52150460
Privacy requires more than just encryption of data before and during transmission. Privacy would actually demand hiding the sheer…
Expand
2018
2018
Law and IoT: How to see things clearly in the Fog
Szilvia Varadi
,
G. Varkonyi
,
A. Kertész
International Conference on Fog and Mobile Edge…
2018
Corpus ID: 44161547
As numerous devices are joining the Internet, we will soon face a foggy and cloudy world of interconnected smart devices. Cloud…
Expand
2014
2014
Privacy Enhancing Technologies for Wireless Sensor Networks
Chi-Yin Chow
,
Wenjian Xu
,
T. He
2014
Corpus ID: 53374808
Since wireless sensor networks (WSNs) are vulnerable to malicious attacks due to their characteristics, privacy is a critical…
Expand
2011
2011
Isolation in Cloud Computing and Privacy-Enhancing Technologies
N. Sonehara
,
I. Echizen
,
Sven Wohlgemuth
Business & Information Systems Engineering
2011
Corpus ID: 15292637
Cloud Computing lifts the borders between the access control domain of individuals’ and companies’ IT systems by processing their…
Expand
2009
2009
Why Vein Recognition Needs Privacy Protection
Daniel Hartung
,
C. Busch
Fifth International Conference on Intelligent…
2009
Corpus ID: 14617686
This paper describes the emerging biometric modality of vein recognition and privacy concerns that arise with its widespread use…
Expand
2007
2007
Privacy Enhancing Technologies for RFID in Retail- An Empirical Investigation
S. Spiekermann
Ubiquitous Computing
2007
Corpus ID: 15953502
This article investigates the conflicting area of user benefits arising through item level RFID tagging and a desire for privacy…
Expand
2006
2006
PPINA - A Forensic Investigation Protocol for Privacy Enhancing Technologies
G. Antoniou
,
Campbell Wilson
,
Dimitris Geneiatakis
Communications and Multimedia Security
2006
Corpus ID: 17207296
Although privacy is often seen as an essential right for internet users, the provision of anonymity can also provide the ultimate…
Expand
2006
2006
The APROB Channel: Adaptive Semi-Real-Time Anonymous Communication
G. Tóth
,
Zoltán Hornák
IFIP International Information Security…
2006
Corpus ID: 17514007
Anonymous communication has become a building block of network services. Besides providing anonymity, speed (and thus real-time…
Expand
Review
2002
Review
2002
Protecting Privacy with Economics: Economic Incentives for Preventive Technologies in Ubiquitous Computing Environments
Alessandro Acquisti
2002
Corpus ID: 14643080
Ubiquitous computing environments make the economic analysis of privacy more difficult as they exacerbate information asymmetries…
Expand
2002
2002
Public Ends by Digital Means: some thoughts on e-government and the creation of public value
Carlos A. Osorio
2002
Corpus ID: 154695204
This paper is about the importance of understanding and managing context in digital government. It presents a working definition…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required