SmokeScreen: flexible privacy controls for presence-sharing
暂无分享,去创建一个
[1] James A. Landay,et al. Privacy risk models for designing privacy-sensitive ubiquitous computing systems , 2004, DIS '04.
[2] Robert J. T. Morris,et al. The evolution of storage systems , 2003, IBM Syst. J..
[3] Craig A. N. Soules,et al. Connections: using context to enhance file search , 2005, SOSP '05.
[4] Landon P. Cox,et al. Presence-Exchanges: Toward Sustainable Presence-Sharing , 2006, Seventh IEEE Workshop on Mobile Computing Systems & Applications (WMCSA'06 Supplement).
[5] Kostas G. Anagnostakis,et al. Exchange-based incentive mechanisms for peer-to-peer file sharing , 2004, 24th International Conference on Distributed Computing Systems, 2004. Proceedings..
[6] James A. Landay,et al. An architecture for privacy-sensitive ubiquitous computing , 2004, MobiSys '04.
[7] Marc Davis,et al. Metadata creation system for mobile images , 2004, MobiSys '04.
[8] Marco Gruteser,et al. Enhancing Location Privacy in Wireless LAN Through Disposable Interface Identifiers: A Quantitative Analysis , 2003, WMASH '03.
[9] William M. Daley,et al. Digital Signature Standard (DSS) , 2000 .
[10] Paul Dourish,et al. Unpacking "privacy" for a networked world , 2003, CHI '03.
[11] J. Davenport. Editor , 1960 .
[12] Nigel Davies,et al. Preserving Privacy in Environments with Location-Based Applications , 2003, IEEE Pervasive Comput..
[13] Pete Chown,et al. Advanced Encryption Standard (AES) Ciphersuites for Transport Layer Security (TLS) , 2002, RFC.
[14] David Mazières,et al. RE: Reliable Email , 2006, NSDI.
[15] Jim Gray,et al. Notes on Data Base Operating Systems , 1978, Advanced Course: Operating Systems.
[16] Benny Pinkas,et al. Efficient Private Matching and Set Intersection , 2004, EUROCRYPT.
[17] Simon King,et al. MMM2: mobile media metadata for media sharing , 2005, CHI EA '05.
[18] Xerox,et al. The Small World , 1999 .
[19] John C. Tang,et al. Work rhythms: analyzing visualizations of awareness histories of distributed groups , 2002, CSCW '02.
[20] Marc Davis,et al. Bluetooth Pooling to Enrich Co-Presence Information , 2005 .
[21] Tara Matthews,et al. Location disclosure to social relations: why, when, & what people want to share , 2005, CHI.
[22] Ronald L. Rivest,et al. The MD5 Message-Digest Algorithm , 1992, RFC.
[23] Bill N. Schilit,et al. Place Lab: Device Positioning Using Radio Beacons in the Wild , 2005, Pervasive.
[24] Alex Pentland,et al. Reality mining: sensing complex social systems , 2006, Personal and Ubiquitous Computing.
[25] Alex Pentland,et al. Social serendipity: mobilizing social software , 2005, IEEE Pervasive Computing.
[26] Marco Gruteser,et al. USENIX Association , 1992 .
[27] Alessandro Acquisti,et al. Information revelation and privacy in online social networks , 2005, WPES '05.
[28] Gregory D. Abowd,et al. The ContextCam: Automated Point of Capture Video Annotation , 2004, UbiComp.
[29] 尚弘 島影. National Institute of Standards and Technologyにおける超伝導研究及び生活 , 2001 .
[30] Abigail Sellen,et al. The ubiquitous camera: an in-depth study of camera phone use , 2005, IEEE Pervasive Computing.
[31] Anind K. Dey,et al. Who wants to know what when? privacy preference determinants in ubiquitous computing , 2003, CHI Extended Abstracts.