Architecting Pervasive Computing Systems for Privacy: A Survey
暂无分享,去创建一个
[1] Frank Stajano,et al. Location Privacy in Pervasive Computing , 2003, IEEE Pervasive Comput..
[2] Lars Kulik,et al. A Formal Model of Obfuscation and Negotiation for Location Privacy , 2005, Pervasive.
[3] B. Bhattacharjee,et al. A Protocol for Scalable Anonymous Communication , 1999 .
[4] Marc Langheinrich,et al. Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems , 2001, UbiComp.
[5] Roy H. Campbell,et al. Routing through the mist: privacy preserving communication in ubiquitous computing environments , 2002, Proceedings 22nd International Conference on Distributed Computing Systems.
[6] Marco Gruteser,et al. USENIX Association , 1992 .
[7] Stefan A. Brands,et al. Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy , 2000 .
[8] Valérie Issarny,et al. Efficient Context-aware Service Discovery in Multi-Protocol Pervasive Environments , 2006, 7th International Conference on Mobile Data Management (MDM'06).
[9] Butler W. Lampson,et al. A note on the confinement problem , 1973, CACM.
[10] James A. Landay,et al. An architecture for privacy-sensitive ubiquitous computing , 2004, MobiSys '04.
[11] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[12] John T. Stasko,et al. Evaluating image filtering based techniques in media space applications , 1998, CSCW '98.
[13] James L. Crowley,et al. Perceptual user interfaces: things that see , 2000, CACM.
[14] Carman Neustaedter,et al. The Design of a Context-Aware Home Media Space for Balancing Privacy and Awareness , 2003, UbiComp.
[15] Aravind Srinivasan,et al. P/sup 5/ : a protocol for scalable anonymous communication , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[16] Tetsuji Satoh,et al. An anonymous communication technique using dummies for location-based services , 2005, ICPS '05. Proceedings. International Conference on Pervasive Services, 2005..
[17] Abhi Shelat,et al. Privacy and identity management for everyone , 2005, DIM '05.
[18] Robert Tappan Morris,et al. Tarzan: a peer-to-peer anonymizing network layer , 2002, CCS '02.
[19] Marc Langheinrich,et al. A Privacy Awareness System for Ubiquitous Computing Environments , 2002, UbiComp.
[20] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[21] James A. Landay,et al. Development and evaluation of emerging design patterns for ubiquitous computing , 2004, DIS '04.
[22] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[23] Scott E. Hudson,et al. Techniques for addressing fundamental privacy and disruption tradeoffs in awareness support systems , 1996, CSCW '96.
[24] Alexander Pretschner,et al. Distributed usage control , 2006, CACM.
[25] Christopher Edwards,et al. The effects of filtered video on awareness and privacy , 2000, CSCW '00.
[26] Yael Tauman Kalai,et al. How to Leak a Secret: Theory and Applications of Ring Signatures , 2001, Essays in Memory of Shimon Even.
[27] Larry Korba,et al. Towards Meeting the Privacy Challenge: Adapting DRM , 2002, Digital Rights Management Workshop.
[28] Saadi Lahlou,et al. European disappearing computer privacy design guidelines, Version 1.1 , 2004 .
[29] Michael K. Reiter,et al. Crowds: anonymity for Web transactions , 1998, TSEC.
[30] Lorrie Faith Cranor,et al. The platform for privacy preferences , 1999, CACM.
[31] David Chaum,et al. Group Signatures , 1991, EUROCRYPT.