Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,397,758 papers from all fields of science
Search
Sign In
Create Free Account
Privacy-enhancing technologies
Known as:
PET
, Privacy enhancing technologies
Privacy-Enhancing Technologies (PET) is the standardized term referring to specific methods that act in accordance with the laws of data protection…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
24 relations
Anonymous web browsing
Credential
Cypherpunk
Digital credential
Expand
Broader (2)
Identity management
Privacy
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
The Road to Privacy in IoT: Beyond Encryption and Signatures, Towards Unobservable Communication
R. C. Staudemeyer
,
H. C. Pöhls
,
M. Wójcik
IEEE International Symposium on a World of…
2018
Corpus ID: 52150460
Privacy requires more than just encryption of data before and during transmission. Privacy would actually demand hiding the sheer…
Expand
2018
2018
Law and IoT: How to see things clearly in the Fog
Szilvia Varadi
,
G. Varkonyi
,
A. Kertész
International Conference on Fog and Mobile Edge…
2018
Corpus ID: 44161547
As numerous devices are joining the Internet, we will soon face a foggy and cloudy world of interconnected smart devices. Cloud…
Expand
Review
2015
Review
2015
Practical privacy-enhancing technologies
J. Hajny
,
L. Malina
,
Petr Dzurenda
International Conference on Telecommunications…
2015
Corpus ID: 7521253
The purpose of this paper is to provide an overview of current cryptographic Privacy-Enhancing Technologies (PETs) and show…
Expand
2011
2011
Isolation in Cloud Computing and Privacy-Enhancing Technologies
N. Sonehara
,
I. Echizen
,
Sven Wohlgemuth
Business & Information Systems Engineering
2011
Corpus ID: 15292637
Cloud Computing lifts the borders between the access control domain of individuals’ and companies’ IT systems by processing their…
Expand
2010
2010
Implementing a Privacy-Friendly Secure Logging Module into the PRIME Core
Anders Ellvin
,
T. Pulls
2010
Corpus ID: 58049895
When individuals access services online they are often required to disclose excessive amounts of personally identifiable…
Expand
2008
2008
Combining Biometric Authentication with Privacy-Enhancing Technologies
Konstantin Hyppönen
,
M. Hassinen
,
E. Trichina
Trust and Trustworthy Computing
2008
Corpus ID: 514564
Although state of public research in privacy-enhancing technologies (PET) is reasonably good, they are not yet widely used in…
Expand
2007
2007
Privacy Enhancing Technologies for RFID in Retail- An Empirical Investigation
S. Spiekermann
Ubiquitous Computing
2007
Corpus ID: 15953502
This article investigates the conflicting area of user benefits arising through item level RFID tagging and a desire for privacy…
Expand
2005
2005
Uniting Legislation with RFID Privacy-Enhancing Technologies
Melanie R. Rieback
,
B. Crispo
,
A. Tanenbaum
2005
Corpus ID: 14813413
RFID is a popular identification and automation technology with serious security and privacy threats. Legislation expounds upon…
Expand
2005
2005
Forensics and Privacy-Enhancing Technologies
M. Olivier
2005
Corpus ID: 166798828
Flocks is a privacy-enhancing technology (PET) used to hide the web usage patterns of employees in an organization against…
Expand
Review
2002
Review
2002
Protecting Privacy with Economics: Economic Incentives for Preventive Technologies in Ubiquitous Computing Environments
Alessandro Acquisti
2002
Corpus ID: 14643080
Ubiquitous computing environments make the economic analysis of privacy more difficult as they exacerbate information asymmetries…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required