Maintaining Privacy in Pervasive Computing — Enabling Acceptance of Sensor-based Services
暂无分享,去创建一个
[1] Fred H. Cate,et al. Principles for Protecting Privacy , 2002 .
[2] Michael K. Reiter,et al. Crowds: anonymity for Web transactions , 1998, TSEC.
[3] David E. Culler,et al. TinyOS: An Operating System for Sensor Networks , 2005, Ambient Intelligence.
[4] Bennett Daviss. The net comes home , 2003 .
[5] H. P Gassmann,et al. OECD guidelines governing the protection of privacy and transborder flows of personal data , 1981 .
[6] Marco Gruteser,et al. USENIX Association , 1992 .
[7] Frank Stajano,et al. Mix zones: user privacy in location-aware services , 2004, IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second.
[8] G. Vattimo. The Transparent Society , 1992 .
[9] Joachim Biskup,et al. Secure Mediation: Requirements, Design, and Architecture , 2003, J. Comput. Secur..
[10] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[11] J. Michael,et al. Privacy and human rights , 1994 .
[12] G. Marx. Murky conceptual waters: The public and the private , 2001, Ethics and Information Technology.
[13] J. Rubenfeld. The Right of Privacy , 1989 .
[14] Michael Waidner,et al. Platform for Enterprise Privacy Practices: Privacy-Enabled Management of Customer Data , 2002, Privacy Enhancing Technologies.
[15] John Leubsdorf,et al. Privacy and Freedom , 1968 .
[16] Marc Langheinrich,et al. A Privacy Awareness System for Ubiquitous Computing Environments , 2002, UbiComp.
[17] Anne Adams,et al. Multimedia information changes the whole privacy ballgame , 2000, CFP '00.
[18] Andreas Pfitzmann,et al. Anonymity, Unobservability, and Pseudonymity - A Proposal for Terminology , 2000, Workshop on Design Issues in Anonymity and Unobservability.
[19] Daniel W. Engels,et al. I. Radio-Frequency Identification: Security Risks and Challenges , 2003 .
[20] Randy H. Katz,et al. Emerging challenges: Mobile networking for “Smart Dust” , 2000, Journal of Communications and Networks.
[21] Michael Kirby. Privacy Protection-A New Beginning? , 2000 .
[22] Joseph Gray Jackson,et al. Privacy and Freedom , 1968 .
[23] Ari Juels,et al. Soft blocking: flexible blocker tags on the cheap , 2004, WPES '04.
[24] Alessandro Acquisti,et al. Privacy and Security of Personal Information - Economic Incentives and Technological Solutions , 2004, Economics of Information Security.
[25] Daniel Guérin,et al. Anarchism: From Theory to Practice , 1970 .
[26] Marc Langheinrich,et al. The platform for privacy preferences 1.0 (p3p1.0) specification , 2002 .
[27] Anind K. Dey,et al. Everyday Privacy in Ubiquitous Computing Environments , 2002 .
[28] Siani Pearson,et al. Towards accountable management of identity and privacy: sticky policies and enforceable tracing services , 2003, 14th International Workshop on Database and Expert Systems Applications, 2003. Proceedings..
[29] James H. Aylor,et al. Computer for the 21st Century , 1999, Computer.
[30] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.