System Requirement Analyses for Ubiquitous Environment Management System
暂无分享,去创建一个
[1] Anders Albrechtslund. The Postmodern Panopticon: Surveillance and Privacy in the Age of Ubiquitous Computing , 2005 .
[2] Sang Ho Lee,et al. Design of the Architecture for Agent of the Personality Security in the Ubiquitous Environment , 2008, KES-AMSTA.
[3] J. Antonio García-Macías,et al. Deploying a voice capture sensor network system for a secure ubiquitous home environment , 2009 .
[4] Dong-Hoon Shin,et al. Security Protective Measures for the Ubiquitous City Integrated Operation Center , 2008, 2008 Third International Conference on Broadband Communications, Information Technology & Biomedical Applications.
[5] David Scott. Abstracting application-level security policy for ubiquitous computing , 2005 .
[6] Joseph G. Tront,et al. Ubiquitous Security: Privacy versus Protection , 2006, PSC.