{"title":"SAT中的隐私保护(通过单一认证)","authors":"G. Kim, SuGil Choi, Deok-Gyu Lee, J. Han","doi":"10.1109/ITCS.2010.5581262","DOIUrl":null,"url":null,"abstract":"In SAT (Single Authentication Through) scheme, each smart camera is capable of identifying, tracking identified objects, and delivering associate ID information to sibling subjects. So in this paper, we suggest a privacy preservation scheme for preventing privacy infringement during propagation of sensitive information.","PeriodicalId":166169,"journal":{"name":"2010 2nd International Conference on Information Technology Convergence and Services","volume":"59 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Privacy Preservation in SAT (Single Authentication Through)\",\"authors\":\"G. Kim, SuGil Choi, Deok-Gyu Lee, J. Han\",\"doi\":\"10.1109/ITCS.2010.5581262\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In SAT (Single Authentication Through) scheme, each smart camera is capable of identifying, tracking identified objects, and delivering associate ID information to sibling subjects. So in this paper, we suggest a privacy preservation scheme for preventing privacy infringement during propagation of sensitive information.\",\"PeriodicalId\":166169,\"journal\":{\"name\":\"2010 2nd International Conference on Information Technology Convergence and Services\",\"volume\":\"59 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-09-23\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2010 2nd International Conference on Information Technology Convergence and Services\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ITCS.2010.5581262\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 2nd International Conference on Information Technology Convergence and Services","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ITCS.2010.5581262","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Privacy Preservation in SAT (Single Authentication Through)
In SAT (Single Authentication Through) scheme, each smart camera is capable of identifying, tracking identified objects, and delivering associate ID information to sibling subjects. So in this paper, we suggest a privacy preservation scheme for preventing privacy infringement during propagation of sensitive information.