Understanding trust in privacy-aware video surveillance systems (English)
- New search for: Rashwan, Hatem A.
- New search for: Solanas, Agusti
- New search for: Puig, Domènec
- New search for: Martínez-Ballesté, Antoni
- New search for: Rashwan, Hatem A.
- New search for: Solanas, Agusti
- New search for: Puig, Domènec
- New search for: Martínez-Ballesté, Antoni
In:
International Journal of Information Security
;
15
, 3
; 225-234
;
2015
-
ISSN:
- Article (Journal) / Print
-
Title:Understanding trust in privacy-aware video surveillance systems
-
Contributors:Rashwan, Hatem A. ( author ) / Solanas, Agusti ( author ) / Puig, Domènec ( author ) / Martínez-Ballesté, Antoni ( author )
-
Published in:International Journal of Information Security ; 15, 3 ; 225-234
-
Publisher:
- New search for: Springer Berlin Heidelberg
- New search for: Springer
-
Place of publication:Berlin
-
Publication date:2015
-
ISSN:
-
ZDBID:
-
DOI:
-
Type of media:Article (Journal)
-
Type of material:Print
-
Language:English
- New search for: 54.38
- Further information on Basic classification
-
Keywords:
-
Classification:
BKL: 54.38 Computersicherheit -
Source:
Table of contents – Volume 15, Issue 3
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 225
-
Understanding trust in privacy-aware video surveillance systemsRashwan, Hatem A. / Solanas, Agusti / Puig, Domènec / Martínez-Ballesté, Antoni et al. | 2015
- 235
-
Taking back control of privacy: a novel framework for preserving cloud-based firewall policy confidentialityKurek, Tytus / Niemiec, Marcin / Lason, Artur et al. | 2015
- 251
-
Multi-Keyword search over encrypted data with scoring and search pattern obfuscationOrencik, Cengiz / Selcuk, Ayse / Savas, Erkay / Kantarcioglu, Murat et al. | 2015
- 271
-
Broadcast encryption with dealershipGritti, Clémentine / Susilo, Willy / Plantard, Thomas / Liang, Kaitai / Wong, Duncan S. et al. | 2015
- 285
-
Efficient parallelizable hashing using small non-compressing primitivesMennink, Bart / Preneel, Bart et al. | 2015
- 301
-
Detection of firewall configuration errors with updatable treeAbbes, Tarek / Bouhoula, Adel / Rusinowitch, Michaël et al. | 2015
- 319
-
Effectiveness and performance analysis of model-oriented security requirements engineering to elicit security requirements: a systematic solution for developing secure software systemsSalini, P. / Kanmani, S. et al. | 2015