Location privacy and location-aware computing
暂无分享,去创建一个
[1] Jon Peterson,et al. A Presence-based GEOPRIV Location Object Format , 2005, RFC.
[2] Lars Kulik,et al. Simulation of Obfuscation and Negotiation for Location Privacy , 2005, COSIT.
[3] Lars Kulik,et al. A Formal Model of Obfuscation and Negotiation for Location Privacy , 2005, Pervasive.
[4] James M. Rehg,et al. Using Sound Source Localization in a Home Environment , 2005, Pervasive.
[5] Bill N. Schilit,et al. Place Lab: Device Positioning Using Radio Beacons in the Wild , 2005, Pervasive.
[6] James Scott,et al. Audio Location: Accurate Low-Cost Location Sensing , 2005, Pervasive.
[7] Andreas Heinemann,et al. Survey on Location Privacy in Pervasive Computing , 2005 .
[8] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[9] James A. Landay,et al. An architecture for privacy-sensitive ubiquitous computing , 2004, MobiSys '04.
[10] Carl A. Gunter,et al. A Formal Privacy System and Its Application to Location Based Services , 2004, Privacy Enhancing Technologies.
[11] Mark Strassman,et al. Case study: Development of the Find Friend Application , 2004 .
[12] Michael F. Worboys,et al. GIS : a computing perspective , 2004 .
[13] Marco Gruteser,et al. Wireless Location Privacy Protection , 2003, Computer.
[14] Marco Gruteser,et al. USENIX Association , 1992 .
[15] Telecommunications Board,et al. IT Roadmap to a Geospatial Future , 2003 .
[16] Eija Kaasinen,et al. User needs for location-aware mobile services , 2003, Personal and Ubiquitous Computing.
[17] Richard Beckwith,et al. Designing for Ubiquity: The Perception of Privacy , 2003, IEEE Pervasive Comput..
[18] Dieter Hutter,et al. Security and Privacy in Pervasive Computing State of the Art and Future Directions , 2003, SPC.
[19] Marco Gruteser,et al. A Methodological Assessment of Location Privacy Risks in Wireless Hotspot Networks , 2003, SPC.
[20] Anind K. Dey,et al. Location-Based Services for Mobile Telephony: a Study of Users' Privacy Concerns , 2003, INTERACT.
[21] Frank Stajano,et al. Location Privacy in Pervasive Computing , 2003, IEEE Pervasive Comput..
[22] Nigel Davies,et al. Preserving Privacy in Environments with Location-Based Applications , 2003, IEEE Pervasive Comput..
[23] Marc Langheinrich,et al. A Privacy Awareness System for Ubiquitous Computing Environments , 2002, UbiComp.
[24] James A. Landay,et al. Approximate Information Flows: Socially-Based Modeling of Privacy in Ubiquitous Computing , 2002, UbiComp.
[25] Marco Gruteser,et al. Framework for security and privacy in automotive telematics , 2002, WMC '02.
[26] Allison Kealy,et al. An Intelligent Navigation Solution for Land Mobile Location-Based Services , 2002, Journal of Navigation.
[27] Tom Rodden,et al. A lightweight approach to managing privacy in location-based services , 2002 .
[28] Vincent M. Stanford,et al. Using Pervasive Computing to Deliver Elder Care , 2002, IEEE Pervasive Comput..
[29] John Canny,et al. Some Techniques for Privacy in Ubicomp and Context-Aware Applications , 2002 .
[30] Trevor Darrell,et al. Privacy in Context , 2001, Hum. Comput. Interact..
[31] Einar Snekkenes,et al. Concepts for personal location privacy policies , 2001, EC '01.
[32] Abdelsalam Helal,et al. Drishti: an integrated navigation system for visually impaired and disabled , 2001, Proceedings Fifth International Symposium on Wearable Computers.
[33] Fredrik Espinoza,et al. GeoNotes: Social and Navigational Aspects of Location-Based Information Systems , 2001, UbiComp.
[34] Marc Langheinrich,et al. Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems , 2001, UbiComp.
[35] Gaetano Borriello,et al. Location Systems for Ubiquitous Computing , 2001, Computer.
[36] Eliseo Clementini,et al. Integration of Imperfect Spatial Information , 2001, J. Vis. Lang. Comput..
[37] Peter Ljungstrand,et al. Context Awareness and Mobile Phones , 2001, Personal and Ubiquitous Computing.
[38] M. Worboys,et al. A formal approach to imperfection in geographic information , 2001 .
[39] Chris Schmandt,et al. Location-Aware Information Delivery with ComMotion , 2000, HUC.
[40] Albrecht Schmidt,et al. There is more to context than location , 1999, Comput. Graph..
[41] Mark S. Ackerman,et al. Privacy in e-commerce: examining user scenarios and privacy preferences , 1999, EC '99.
[42] Roger Clarke,et al. Internet privacy concerns confirm the case for intervention , 1999, CACM.
[43] David Brin,et al. The Transparent Society , 1998 .
[44] Scott E. Hudson,et al. Techniques for addressing fundamental privacy and disruption tradeoffs in awareness support systems , 1996, CSCW '96.
[45] H. Onsrud,et al. Protecting personal privacy in using geographic information systems , 1994 .
[46] Stefan A. Brands,et al. Untraceable Off-line Cash in Wallet with Observers , 2002 .
[47] Michael G. Lamming,et al. Locating Systems at Work: Implications for the Development of Active Badge Applications , 1992, Interact. Comput..
[48] Richard Harper,et al. Looking at ourselves: an examination of the social organisation of two research laboratories , 1992, CSCW '92.
[49] Andy Hopper,et al. The active badge location system , 1992, TOIS.
[50] R. Priest. Data Protection Act , 1988 .
[51] Amos Fiat,et al. How to Prove Yourself: Practical Solutions to Identification and Signature Problems , 1986, CRYPTO.
[52] Silvio Micali,et al. The knowledge complexity of interactive proof-systems , 1985, STOC '85.
[53] James B. Rule,et al. Private Lives and Public Surveillance. , 1975 .
[54] Joseph Gray Jackson,et al. Privacy and Freedom , 1968 .