applied sciences
暂无分享,去创建一个
[1] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[2] Gang Peng,et al. CDN: Content Distribution Network , 2004, ArXiv.
[3] Rafael Ballagas,et al. REXplorer: a mobile, pervasive spell-casting game for tourists , 2007, CHI Extended Abstracts.
[4] Tetsuji Satoh,et al. Protection of Location Privacy using Dummies for Location-based Services , 2005, 21st International Conference on Data Engineering Workshops (ICDEW'05).
[5] Lorrie Faith Cranor,et al. Empirical models of privacy in location sharing , 2010, UbiComp.
[6] John Krumm,et al. Exploring end user preferences for location obfuscation, location-based services, and the value of location , 2010, UbiComp.
[7] Thomas L. Martin,et al. Location Privacy for Users of Wireless Devices through Cloaking , 2008, Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008).
[8] Petra Fagerberg,et al. GeoNotes: A Location-Based Information System for Public Spaces , 2003, Designing Information Spaces.
[9] Jenna Burrell,et al. E-graffiti: evaluating real-world use of a context-aware system , 2002, Interact. Comput..
[10] Marc Langheinrich,et al. I'm Here! Privacy Challenges in Mobile Location Sharing , 2010 .
[11] Pieter H. Hartel,et al. Secure Ad-hoc Pairing with Biometrics: SAfE , 2007 .
[12] Alois Ferscha,et al. Addressing Concepts for Mobile Location-Based Information Services , 2007, HCI.
[13] Peter Fröhlich,et al. Envisioning future mobile spatial applications , 2007, BCS HCI.
[14] Paul A. Longley,et al. A mobile spatial messaging service for a grassroots environmental network , 2008, J. Locat. Based Serv..
[15] René Mayrhofer. Towards an Open Source Toolkit for Ubiquitous Device Authentication , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07).
[16] Marco Gruteser,et al. USENIX Association , 1992 .
[17] Ling Liu,et al. Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms , 2008, IEEE Transactions on Mobile Computing.
[18] Jennifer Ann Rode,et al. The domestic panopticon: location tracking in families , 2010, UbiComp.
[19] John Krumm,et al. Inference Attacks on Location Tracks , 2007, Pervasive.
[20] Gerd Kortuem,et al. A relative positioning system for co-located mobile devices , 2005, MobiSys '05.
[21] Scott Counts,et al. Group-Based Mobile Messaging in Support of the Social Side of Leisure , 2007, Computer Supported Cooperative Work (CSCW).