Understanding Trusted Computing: Will Its Benefits Outweigh Its Drawbacks?
IEEE Security and Privacy
DEXA '03 Proceedings of the 14th International Workshop on Database and Expert Systems Applications
A Dual Watermark-Fingerprint System
IEEE MultiMedia
RFID: A Technical Overview and Its Application to the Enterprise
IT Professional
SECURECOMM '05 Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks
Computer
Digital Rights Management in Ubiquitous Computing
IEEE MultiMedia
Privacy threats and issues in mobile RFID
ARES '06 Proceedings of the First International Conference on Availability, Reliability and Security
SECPERU '06 Proceedings of the Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing
IEEE Security and Privacy
RFID Security Issues in Military Supply Chains
ARES '07 Proceedings of the The Second International Conference on Availability, Reliability and Security
Mobile phone based RFID architecture for secure electronic Payments using RFID credit cards
ARES '07 Proceedings of the The Second International Conference on Availability, Reliability and Security
A unified approach to content-based and fault-tolerant music recognition
IEEE Transactions on Multimedia
Hi-index | 0.00 |
The increasing prevalence of ubiquitous computing (UC) mediums presents many unique security and privacy challenges. Digital Right Management (DRM) technologies and Radio Frequency Identification (RFID) technology are at the frontier of UC and are the subject of modern privacy concerns. This paper will discus both technologies and relating issues, and in addition we propose a Compromise Privacy Model (CPM) based on information gathered by DRM and RFID. Such model may be use to show how extensively our privacy is compromised.