The dining cryptographers problem: unconditional sender and recipient untraceability
Journal of Cryptology
STOC '91 Proceedings of the twenty-third annual ACM symposium on Theory of computing
Untraceable electronic mail, return addresses, and digital pseudonyms
Communications of the ACM
Communications of the ACM
RFID Systems and Security and Privacy Implications
CHES '02 Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems
STOC '82 Proceedings of the fourteenth annual ACM symposium on Theory of computing
Anonymous Connections and Onion Routing
SP '97 Proceedings of the 1997 IEEE Symposium on Security and Privacy
Receiver anonymity via incomparable public keys
Proceedings of the 10th ACM conference on Computer and communications security
The design of a cryptographic security architecture
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
Privacy intrusion detection using dynamic Bayesian networks
ICEC '06 Proceedings of the 8th international conference on Electronic commerce: The new e-commerce: innovations for conquering current barriers, obstacles and limitations to conducting successful business on the internet
A Bayesian Network Approach to Detecting Privacy Intrusion
WI-IATW '06 Proceedings of the 2006 IEEE/WIC/ACM international conference on Web Intelligence and Intelligent Agent Technology
Over-exposed?: privacy patterns and considerations in online and mobile photo sharing
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Preventing camera recording by designing a capture-resistant environment
UbiComp'05 Proceedings of the 7th international conference on Ubiquitous Computing
Security and privacy for augmented reality systems
Communications of the ACM
Hi-index | 0.02 |
The growing popularity of inexpensive, portable recording devices, such as cellular phone cameras and compact digital audio recorders, presents a significant new threat to privacy. We propose a set of technologies that can be integrated into recording devices to provide stronger, more accurately targeted privacy protections than other legal and technical measures now under consideration. Our design is based on an informed consent principle, which it supports by the use of novel devices and protocols that automate negotiations over consent and ensure appropriate safeguards on recorded data. We define the protocols needed for this purpose and establish their security. We also describe a working prototype implementation that safeguards audio recorded by laptop PCs in a wireless network.