Eavesdropping

Results: 55



#Item
1

PEEP: Passively Eavesdropping Private Input via Brainwave Signals 1 1 Ajaya Neupane, 2 Md Lutfor Rahman ? , 1 Nitesh Saxena

Add to Reading List

Source URL: fc17.ifca.ai

- Date: 2017-04-05 01:53:13
    2

    Peeping Tom in the Neighborhood: Keystroke Eavesdropping on Multi-User Systems Kehuan Zhang Indiana University, Bloomington

    Add to Reading List

    Source URL: www.usenix.org

    - Date: 2009-06-15 12:24:47
      3

      G.P. Hancke, Eavesdropping Attacks on High-Frequency RFID Tokens

      Add to Reading List

      Source URL: www.rfidblog.org.uk

      - Date: 2010-06-30 06:25:06
        4Privacy / Human resource management / Personal life / Workplace / Employment / Electronic Communications Privacy Act / Employee monitoring / Konop v. Hawaiian Airlines /  Inc. / Workplace privacy / United States v. Councilman / Internet privacy / Personally identifiable information

        THE EAVESDROPPING EMPLOYER: A TWENTY-FIRST CENTURY FRAMEWORK FOR EMPLOYEE MONITORING Corey A. Ciocchetti† † Assistant Professor of Business Ethics and Legal Studies, Daniels College of Business, University of Denver

        Add to Reading List

        Source URL: fpf.org

        Language: English - Date: 2011-09-30 12:48:34
        5Wireless / Automatic identification and data capture / Privacy / Radio-frequency identification / Ubiquitous computing / Telecommunications engineering / Humancomputer interaction / Near field communication / MIFARE / Eavesdropping / ISO/IEC 14443

        Eavesdropping Attacks on High-Frequency RFID Tokens Gerhard P. Hancke July 11, 2008 Eavesdropping Attacks on High-Frequency RFID Tokens – p. 1

        Add to Reading List

        Source URL: www.rfidblog.org.uk

        Language: English - Date: 2009-03-13 17:23:04
        6Floors / Composite materials / Flooring / Classen / Parquetry / Construction / Visual arts / Real estate

        The Spy Next Door Eavesdropping on High Throughput Visible Light Communications Jiska Classen, Joe Chen*, Daniel Steinmetzer, Matthias Hollick, Edward Knightly*

        Add to Reading List

        Source URL: peng.cse.ohio-state.edu

        Language: English - Date: 2015-09-16 05:00:10
        7Tyson

        2016 Tyson Summer Seminar Series in Ecology and Evolution May 26: Ximena Bernal, Purdue University; Host: Carlos Botero  Unraveling the ecology and evolution of interspecific eavesdropping: lessons from frogbiting mid

        Add to Reading List

        Source URL: tyson.wustl.edu

        Language: English - Date: 2008-03-18 14:43:38
          8

          Eavesdropping on Electronic Guidebooks: Observing Learning Resources in Shared Listening Environments Allison Woodruff, Paul M. Aoki, Rebecca E. Grinter, Amy Hurst, Margaret H. Szymanski, and James D. Thornton Palo Alto

          Add to Reading List

          Source URL: www.allisonwoodruff.com

          Language: English - Date: 2004-08-11 20:21:04
            9

            Acoustic Eavesdropping through Wireless Vibrometry Teng Wei† , Shu Wang† , Anfu Zhou∗† and Xinyu Zhang† † University of Wisconsin - Madison, ∗ Institute of Computing Technology, Chinese Academy of Sciences

            Add to Reading List

            Source URL: xyzhang.ece.wisc.edu

            Language: English - Date: 2015-07-23 10:02:46
              10

              Brève note – Short note Ann. soc. entomol. Fr. (n.s.), 2007, 43 (1) : Brève note – Short note Biodiversity eavesdropping: bioacoustics confirms the presence of

              Add to Reading List

              Source URL: sueur.jerome.perso.neuf.fr

              Language: English - Date: 2015-06-22 07:20:45
                UPDATE