A secure and privacy enhanced location-based service transaction protocol in ubiquitous computing environment
暂无分享,去创建一个
[1] Herman T. Tavani,et al. Privacy protection, control of information, and privacy-enhancing technologies , 2001, CSOC.
[2] Mahadev Satyanarayanan,et al. Pervasive computing: vision and challenges , 2001, IEEE Wirel. Commun..
[3] William Stallings. Secure Hash Algorithm , 2011, Encyclopedia of Cryptography and Security.
[4] Nigel Davies,et al. Preserving Privacy in Environments with Location-Based Applications , 2003, IEEE Pervasive Comput..
[5] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[6] James H. Aylor,et al. Computer for the 21st Century , 1999, Computer.
[7] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[8] Marc Langheinrich,et al. A Privacy Awareness System for Ubiquitous Computing Environments , 2002, UbiComp.
[9] Adrian Friday,et al. Integrating Privacy Enhancing Services in Ubiquitous Computing Environments , 2002 .
[10] Gerald Q. Maguire,et al. Role(s) of a proxy in location based services , 2002, The 13th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications.
[11] Anind K. Dey,et al. Towards a Deconstruction of the Privacy Space , 2003 .
[12] P. van Oorschot. Chapter 9 Hash Functions and Data Integrity , .