SBone: Personal Device Sharing Using Social Networks
暂无分享,去创建一个
Liviu Iftode | Lu Han | Pravin Shankar | Badri Nath | Vancheswaran K. Ananthanarayanan | B. Nath | L. Iftode | Lu Han | P. Shankar
[1] Eiji Kawai,et al. USB/IP - A Peripheral Bus Extension for Device Sharing over IP Network (Awarded FREENIX Track Best Paper Award!) , 2005, USENIX ATC, FREENIX Track.
[2] Sacha Brostoff,et al. Transforming the ‘Weakest Link’ — a Human/Computer Interaction Approach to Usable and Effective Security , 2001 .
[3] Jon Kleinberg,et al. Maximizing the spread of influence through a social network , 2003, KDD '03.
[4] Dan Wing,et al. Session Traversal Utilities for NAT (STUN) , 2020, RFC.
[5] Robert Tappan Morris,et al. Persistent personal names for globally connected mobile devices , 2006, OSDI '06.
[6] Yong Ho Song,et al. Design and Implementation of Peripheral Sharing Mechanism on Pervasive Computing with Heterogeneous Environment , 2007, SEUS.
[7] Diana K. Smetters,et al. Talking to Strangers: Authentication in Ad-Hoc Wireless Networks , 2002, NDSS.
[8] Diana K. Smetters,et al. Network-in-a-Box: How to Set Up a Secure Wireless Network in Under a Minute , 2004, USENIX Security Symposium.
[9] Ben Y. Zhao,et al. Preserving privacy in location-based mobile social applications , 2010, HotMobile '10.
[10] Daniel A. Keim,et al. On Knowledge Discovery and Data Mining , 1997 .
[11] Alec Wolman,et al. Lockr: better privacy for social networks , 2009, CoNEXT '09.
[12] Priya Narasimhan,et al. Software Technologies for Embedded and Ubiquitous Systems , 2009, Lecture Notes in Computer Science.
[13] Shaozhi Ye,et al. Davis social links: integrating social networks with internet routing , 2007, LSAD '07.
[14] Nick Feamster,et al. Authenticated out-of-band communication over social links , 2008, WOSN '08.
[15] Jure Leskovec,et al. Meme-tracking and the dynamics of the news cycle , 2009, KDD.
[16] Mark S. Granovetter. The Strength of Weak Ties , 1973, American Journal of Sociology.
[17] Robert Tappan Morris,et al. User-Relative Names for Globally Connected Personal Devices , 2006, IPTPS.
[18] Jonathan D. Rosenberg,et al. Traversal Using Relays around NAT (TURN) Extensions for TCP Allocations , 2010, RFC.
[19] Mark Allman. Personal Namespaces , 2007, HotNets.
[20] Karsten Schwan,et al. CameraCast: flexible access to remote video sensors , 2007, Electronic Imaging.
[21] Paul Dourish,et al. Security in the wild: user strategies for managing security as an everyday, practical problem , 2004, Personal and Ubiquitous Computing.
[22] M. Hansen,et al. Participatory Sensing , 2019, Internet of Things.
[23] N. Asokan,et al. Visitor access management in personal wireless networks , 2005, Seventh IEEE International Symposium on Multimedia (ISM'05).
[24] W. Keith Edwards,et al. Home networking and HCI: what hath god wrought? , 2007, CHI.
[25] Wei Wang,et al. Composable IO: a novel resource sharing platform in personal Clouds , 2011, The Journal of Supercomputing.