Browsing by Author "Levi, Albert"

Sort by: Order: Results:

  • Amro, Belal; Levi, Albert; Saygin, Yucel (2011 IEEE Third International Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third International Conference on Social Computing, 2011-10)
    In general service providing systems, user authentication is required for different purposes such as billing, restricting unauthorized access, etc. A good solution is to use pseudonyms as temporary identities. On the other ...
  • Amro, Amro; Saygin, Yucel; Levi, Albert (IET Intelligent Transport Systems, 2013-12-01)
    Collaborative traffic-monitoring (CTM) systems exploit the location information continuously collected from vehicles. Location data are very sensitive information that made privacy a major obstacle for the widespread usage ...
  • Amro, Belal; Levi, Albert; Saygin, Yucel (IAJIT -The International Arab Journal of Information Technology, 2016-10)
    In service providing systems, user authentication is required for different purposes such as billing, restricting unauthorized access, etc., To protect the privacy of users, their real identities should not be linked to ...
  • Amro, Belal; Saygin, Yucel; Levi, Albert (SPRINGL '10 Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS Pages 55-59, 2010-11)
    Collaborative Traffic Monitoring (CTM) systems exploit the location information continuously collected from cars. Users collaborate by providing their location information to have a global picture of the current traffic ...
  • Amro, Belal; Saygin, Yucel; Levi, Albert (SPRINGL '11 Proceedings of the 4th ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS Pages 1-8, 2011-11)
    Collaborative Traffic Monitoring (CTM) systems exploit the location information continuously collected from vehicles. Users collaborate by providing their location information to have a global picture of the current traffic ...