Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,286,837 papers from all fields of science
Search
Sign In
Create Free Account
Privacy-enhancing technologies
Known as:
PET
, Privacy enhancing technologies
Privacy-Enhancing Technologies (PET) is the standardized term referring to specific methods that act in accordance with the laws of data protection…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
24 relations
Anonymous web browsing
Credential
Cypherpunk
Digital credential
Expand
Broader (2)
Identity management
Privacy
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2019
Review
2019
Privacy Enhancing Technologies in the Internet of Things: Perspectives and Challenges
Shi-Cho Cha
,
T. Hsu
,
Yang Xiang
,
Kuo-Hui Yeh
IEEE Internet of Things Journal
2019
Corpus ID: 70290610
Internet of Things (IoT) devices have brought much efficiency and convenience to our daily life. However, the devices may collect…
Expand
Review
2015
Review
2015
Privacy protection in pervasive systems: State of the art and technical challenges
C. Bettini
,
Daniele Riboni
Pervasive and Mobile Computing
2015
Corpus ID: 6891161
Review
2015
Review
2015
On the Security and Privacy of Internet of Things Architectures and Systems
Emmanouil Vasilomanolakis
,
Jörg Daubert
,
Manisha Luthra
,
E. Gazis
,
A. Wiesmaier
,
Panayotis Kikiras
International Workshop on Secure Internet of…
2015
Corpus ID: 1898852
The Internet of Things (IoT) brings together a multitude of technologies, with a vision of creating an interconnected world. This…
Expand
2010
2010
Profiling the mobile customer - Privacy concerns when behavioural advertisers target mobile phones - Part I
N. King
,
P. Jessen
Computer Law and Security Review
2010
Corpus ID: 62128324
Review
2009
Review
2009
Critical RFID Privacy-Enhancing Technologies
S. Spiekermann
,
S. Evdokimov
IEEE Security and Privacy
2009
Corpus ID: 16680942
RFID technology can help automatically and remotely identify objects, which raises many security concerns. The authors review and…
Expand
Highly Cited
2008
Highly Cited
2008
Privacy Features: Privacy features of European eID card specifications
I. Naumann
,
G. Hogben
2008
Corpus ID: 13890279
Review
2007
Review
2007
Human recognition using biometrics: an overview
A. Ross
,
Anil K. Jain
Ann. des Télécommunications
2007
Corpus ID: 6954000
Establishing identity is becoming critical in our vastly interconnected society. Questions such as “Is she really who she claims…
Expand
Highly Cited
2004
Highly Cited
2004
Privacy-enhancing identity management
M. Hansen
,
P. Berlich
,
J. Camenisch
,
Sebastian Clauss
,
A. Pfitzmann
,
M. Waidner
Information Security Technical Report
2004
Corpus ID: 5236716
2003
2003
A layered architecture for privacy - enhancing technologies
M. Olivier
South African Computer Journal
2003
Corpus ID: 12769104
While a number of privacy-enhancing technologies have been proposed over the past quarter century, very little has been done to…
Expand
Review
2001
Review
2001
Teaching Privacy-Enhancing Technologies
S. Fischer-Hübner
,
H. Lindskog
2001
Corpus ID: 15536874
This paper discusses the increasing relevance of privacy-enhancing technologies (PET) and the importance of teaching PET within…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE