His Late Master's Voice: Barking for Location Privacy

نویسنده

  • Mike Burmester
چکیده

Bob died suddenly leaving his treasure to sister Alice. Eve will do anything to get it, so Alice hides the treasure together with Nipper, and promptly departs. Nipper is a low-cost RFID device that responds only to Alice’s calls— making it possible for Alice to locate the hidden treasure later (she is quite forgetful) when Eve is not around. We study the design of Nipper, the cryptographic mechanisms that support its functionality and the security of the application.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Barking seizure: Acute episodes of barking in a 75-year-old previously healthy man

A 75-year-old right-handed man was admitted to our emergency department complaining of recurrent episodes of involuntary 'barking' within the past 12h. The episodes had occurred after an initial two-minute attack from sleep involving tonic contraction of the upper extremities and jaw locking. By the time of admission, the patient had had a total of at least 7-10 'barking' episodes, each lasting...

متن کامل

Compulsive Barking

COMPULSIVE BARKING Sir, Psychiatric presentation mimicking call of animals is quite rare (Eppright & Favazza, 1987; Chowdhury et al.,1993), only a few cases featuring "zoophilic metamorphosis" of body parts or sex change relating to a dog have been reported (Lukianowiez,1967; Kendall & Jenkins, 1987). We report an atypical case of compulsive barking in a 42-year old Bengali married male from Ca...

متن کامل

Location privacy in vehicular communication systems: a measurement approach

As an enabling technology for boosting cooperations on the road, the emerging vehicular communication systems have the promise to greatly improve road safety, traffic efficiency, and driver convenience through vehicle-to-vehicle and vehicle-to-infrastructure communications. However, since many envisioned applications and services require a user to constantly reveal his locations, the user is in...

متن کامل

Location Based Authentication of KNN Queries with Location and Query Privacy

In mobile communication, spatial queries pose a serious threat to user location privacy because the location of a query may reveal sensitive information about the mobile user. In this paper, study approximate k nearest neighbor (kNN) queries where the mobile user queries the location-based service (LBS) provider about approximate k nearest points of interest (POIs) on the basis of his current l...

متن کامل

improvement of Location-based Algorithm in the Internet of Things

Location Based Services (LBS) has become an important field of research with the rapid development of Internet-based Information Technology (IOT) technology and everywhere we use smartphones and social networks in our everyday lives. Although users can enjoy the flexibility, facility, facility and location-based services (LBS) with the Internet of Things, they may lose their privacy. An untrust...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011